PII ADA Live Scan Results HIPAA Brown Act Legal Government
Login Join Pilot

Security & Data Practices

Last Updated: February 2, 2026

Purpose: This document provides technical details about SentraCheck's security architecture and data handling practices. It is intended to support insurance applications, compliance audits, and due diligence reviews.

1. Data Flow Architecture

SentraCheck processes documents through a stateless, ephemeral pipeline designed to minimize data exposure:

[User Browser] --HTTPS/TLS 1.3--> [Load Balancer]
    |
    v
[API Gateway] --> [Auth Service] (JWT validation)
    |
    v
[Document Processor] (Ephemeral container, memory-only)
    |
    +--> [PII Detection Engine] (Anthropic Claude API)
    +--> [ADA Accessibility Checker]
    +--> [Compliance Rule Engine]
    |
    v
[Results Only] --HTTPS--> [User Browser]

* Documents stored temporarily during processing, securely deleted upon completion
* Processing containers destroyed after each request

1.1 Document Upload Flow

  1. User uploads document via browser (HTTPS/TLS 1.3)
  2. Document received in memory at API gateway
  3. JWT token validated against auth service
  4. Document streamed to ephemeral processing container
  5. Analysis performed entirely in memory
  6. Results returned to user
  7. Processing container terminated; memory zeroed

1.2 Data at Rest

SentraCheck maintains a zero document retention policy. The only data stored persistently:

2. Data Retention Schedule

Data Type Retention Period Storage Location
Uploaded Documents 0 (Not Stored) Memory only during processing
PII Found in Documents 0 (Not Stored) Memory only during processing
Scan Results (Findings) 0 (Not Stored) Returned to user only
Account Data Duration + 30 days Encrypted database (US)
Authentication Logs 90 days Encrypted log storage (US)
API Access Logs 90 days Encrypted log storage (US)
Aggregate Usage Stats 2 years Analytics database (US)
Billing Records 7 years Financial systems (US)

3. Hosting Infrastructure

3.1 Primary Infrastructure

Component Provider Location Certifications
Application Servers AWS US-West-2 (Oregon) SOC 2, ISO 27001, FedRAMP
Database AWS RDS US-West-2 (Oregon) SOC 2, ISO 27001, HIPAA eligible
CDN / DDoS Protection Cloudflare Global Edge SOC 2, ISO 27001
DNS Cloudflare Global DNSSEC enabled

3.2 Data Residency

All persistent data is stored exclusively in the United States (AWS US-West-2 region). Document processing occurs in US-based infrastructure. No customer data is transferred to or processed in other jurisdictions.

4. Encryption Standards

Layer Method Key Management
Data in Transit TLS 1.3 (minimum TLS 1.2) Auto-rotated certificates (Let's Encrypt / AWS ACM)
Data at Rest (Database) AES-256 AWS KMS (customer-managed keys available)
Data at Rest (Backups) AES-256 AWS KMS
Data at Rest (Logs) AES-256 AWS KMS
Password Storage bcrypt (cost factor 12) Per-user salt, adaptive hashing
Session Tokens Cryptographic tokens Database-backed with secure random generation

4.1 TLS Configuration

5. AI & Machine Learning Usage

Key Principle: PII detection uses Anthropic's Claude API for text analysis. Original document files remain on our infrastructure; only extracted text is sent for analysis. OCR processing is fully self-hosted.

5.1 AI Components

Component Purpose Processing Data Sent Externally
PII Detection Engine Identify personal information patterns Anthropic Claude API Document text only (not files)
Name Recognition Identify human names in context Anthropic Claude API Document text only (not files)
Document Classification Categorize document types Anthropic Claude API Document text only (not files)
OCR Processing Extract text from images/scans Self-hosted (Tesseract) None

5.2 What We Don't Do

5.3 Third-Party AI Provider

SentraCheck uses Anthropic's Claude API for PII detection and text analysis. Key details:

5.4 Self-Hosted Components

The following components run entirely on our infrastructure with no external API calls:

Customer documents are never used for model training or improvement.

6. Logging & Audit Trail

6.1 What We Log

Event Type Data Captured Retention
Authentication User ID, timestamp, IP, success/failure, user agent 90 days
API Requests Endpoint, user ID, timestamp, response code, latency 90 days
Document Scans User ID, timestamp, page count, processing time (NO content) 90 days
Admin Actions Admin ID, action type, target, timestamp 2 years
Security Events Event type, source IP, details, timestamp 1 year

6.2 What We Don't Log

6.3 Log Access

7. Access Controls

7.1 Employee Access

7.2 Customer Access

8. Incident Response

SentraCheck maintains a documented incident response plan:

9. Compliance & Certifications

Standard Status Notes
HIPAA Compliant BAA available upon request
CCPA/CPRA Compliant Zero retention model
GDPR Compliant DPA available upon request

10. Security Contact

For security-related inquiries, vulnerability reports, or to request documentation for audits:

Email: security@sentracheck.com
Response SLA: 24 hours for security inquiries
Vulnerability Reports: Acknowledged within 24 hours, triaged within 72 hours

Audit Documentation: Additional technical documentation, penetration test reports, and compliance attestations are available under NDA. Contact security@sentracheck.com to request access.