Security

Security Overview

Last Modified: March 2026

Security and privacy are top priorities at Intempt. All employees complete mandatory security awareness training as part of their onboarding and on an ongoing basis.

Encryption. We encrypt Customer Data in transit using TLS 1.2 or higher and at rest using AES-256 or equivalent encryption standards.

Access Control. We enforce logical isolation of customer data, role-based access controls, and least-privilege principles across all systems.

Backups. We perform automated, encrypted backups of Customer Data and test restoration procedures on a regular basis. Backup copies are retained on a rolling basis for up to one (1) year.

Monitoring. We maintain continuous security logging, uptime monitoring, and availability metrics for the Services.

Secure Development. We follow a secure software development lifecycle (SDLC) that includes security reviews, dependency scanning, infrastructure hardening, and testing against the OWASP Top 10.

Incident Response. We maintain a formal incident response process with defined escalation, containment, and remediation procedures. In the event of a confirmed security incident involving Customer Data, we will notify affected customers within seventy-two (72) hours where feasible.

AI Data Protection. Intempt trains per-customer AI models exclusively within each customer's isolated tenant environment. Customer data is never used to train models serving other customers. Third-party AI subprocessors (OpenAI and Anthropic) are prohibited under commercial API agreements from using Customer Data to train their own models.

Roadmap

SOC 2 Type II certification is a compliance priority with a target completion of Q1 2027. Multi-factor authentication (MFA) and single sign-on (SSO) are planned features on our product roadmap. These capabilities are not currently available and should not be relied upon as current security controls.

AI Model Security. Customer AI models are trained and stored within logically isolated per-customer environments. Access is restricted to authorized Intempt engineering personnel under least-privilege controls. Training pipelines are subject to Intempt's SDLC security review. Customer AI models are deleted within ninety (90) days of subscription termination.

Trust Portal: https://intempt.trustshare.com/

Contact: hey@intempt.com | Intempt Technologies LLC, 1101 W 34th St #595, Austin, TX 78705

Intempt Security | Enterprise-Grade Data Protection