Your data is yours. We do not aggregate it across tenants. We do not train shared models on it. We do not move it without your permission. We do not retain it after you leave.
Ophanix operates on a single, contractually binding principle: customer data is the customer's data. We do not aggregate it across tenants. We do not train shared models on it. We do not move it without permission. We do not retain it after a customer leaves.
This page describes how that principle is enforced — technically, contractually, and operationally — across every Ophanix engagement.
Every Ophanix customer receives a logically isolated tenant. Multi-tenant deployments are available only for shared light-touch surfaces (such as public-facing RoboChat) and never for sensitive workloads. For regulated and sovereign customers we deploy in three modes:
Production data — raw signal, derived features, inference outputs, operator decisions — remains in the customer-selected region. No replication, backup, telemetry, or support access crosses that boundary without an explicit, signed customer authorisation.
Available regions: EU (Frankfurt, Amsterdam, Paris), UK (London), Switzerland (Zurich), UAE (Dubai), Singapore, US (us-east-1, us-west-2). On-prem deployments are unconstrained.
Models retrained on customer data are retrained in the customer's tenant and their weights remain there. We do not aggregate customer fine-tunes into shared models. We do not use customer prompts, inputs, or outputs to improve generally-available models. Where the customer authorises a federated approach, the boundary is documented and audited.
Foundation models (e.g. GPT, Claude, Gemini) are accessed under data-processing agreements with the upstream provider. Customer data is sent only with the explicit prompt enabled in customer policy, and the provider's no-training contract clause is verified on every onboarding.
Ophanix engineering access to a customer tenant is off by default. Access is granted only on customer ticket, time-limited, logged, and audited. The customer security team receives the access log on the same cadence as their own SIEM.
We publish a sub-processor list per region and notify customers at least 30 days before any addition. Customers have a right to object; we either find an alternative or the change does not happen for that customer.
We share the complete audit pack — methodology, findings, remediation log, third-party attestations — with prospective customers under NDA during procurement.