Trust Centre

Trust, control, and transparency.

We make data, decisions, and approval flows measurable and auditable at the enterprise operating layer. Your company data belongs to you — not to us.

How we protect your data

  • Data is stored encrypted at rest.
  • TLS is enforced for all data in transit.
  • Tenant isolation is enforced via Supabase Row Level Security policies.
  • Your company data is never used to train AI models.

Who can see what

  • Knowledge access is restricted by role, department, authority level, confidentiality classification, and visibility rules.
  • Even administrators cannot view flows outside their authorisation scope in full.
  • A five-layer confidentiality matrix governs field-level visibility across all operations.

How operations requiring approval are paused

  • Financial thresholds (e.g. €350) are defined in configuration.
  • Critical operations never auto-proceed; they are routed to the appropriate person for human approval.
  • Operations awaiting approval are visible and traceable in the /company/restricted queue.

How the audit trail works

  • All significant decisions and policy enforcements are written to an immutable audit log.
  • The log operates on an append-only model; historical records cannot be modified.
  • A DELETE=false RLS policy prevents audit records from being deleted.

Multi-model orchestration — no open-source LLMs

  • Orygent operates with a multi-model orchestration layer. Model selection is managed within the platform according to task, quality, security, cost, and governance requirements.
  • There is no dependency on a single model provider.
  • Open-source LLMs are never used. All models are enterprise-grade and commercially licensed with contractual data protection terms.
  • The identity of the model in use is not disclosed based on geographic or political reference.

Platform administrator vs. company administrator

  • Platform management and tenant management are strictly separated.
  • Orygent platform administrators do not have default access to company data.
  • Break-glass (emergency) access requires a documented justification and is written to the audit trail.

Data deletion and portability

  • Deletion requests are processed under GDPR Article 17.
  • Data portability is provided under GDPR Article 20.
  • Requests can be submitted to support@orygent.com.

Breach notification

  • Where required under GDPR Article 33, breach notifications are submitted to the relevant supervisory authority within 72 hours.
  • Affected company administrators are notified without undue delay.

Trust Control Layer

  • A dedicated policy engine sits between every AI action and execution.
  • Five rule layers — role, department, authority, confidentiality, and channel — must all clear before any operation proceeds.
  • Any rule violation automatically triggers a RESTRICTED state and routes to the human approval queue.
  • The Trust Control Layer cannot be bypassed by any user, including platform administrators.

This page has been reviewed by our legal counsel and is updated periodically.

For enquiries: privacy@orygent.com