This document outlines the cryptographic and procedural controls governing your information within the CPH.AI infrastructure. We balance sovereign control with the necessity of system optimization.
CPH.AI distinguishes strictly between Tenant Data (your sensitive inputs/outputs) and System Data (infrastructure logs and usage patterns).
We do not sell personally identifiable client data. However, we reserve the right to process anonymized, aggregated metadata and usage statistics to optimize global system heuristics, security postures, and resource allocation algorithms.
Our architecture prioritizes model hygiene:
While our core infrastructure is sovereign, our public-facing web presence utilizes standard analytics tools to improve user experience.
We collect data required to ensure system stability and security:
We utilize a GitOps-native infrastructure that supports Data Residency Pinning.
While we respect geographical boundaries for data processing where explicitly configured, routing optimizations may occasionally transit through intermediary nodes for performance unless strict "Air-Gap" mode is actively provisioned.
To deliver our services, we utilize trusted sub-processors (e.g., AWS, Azure, Pinecone).
We provide mechanisms for control:
For inquiries regarding this protocol or specific residency requirements, establish a secure uplink with our Data Protection Officer: