Overview
GENYS AI Inc. (“GENYS”, “we”, “us”) provides a memory and alignment platform (APIs, SDKs, console) for brand‑safe, drift‑resistant AI. Security is built into our design, development, and operations. This page summarizes how we protect data processed by GENYS.
Data Classification
We classify data as Public, Internal, Confidential (e.g., account metadata), and Restricted (e.g., prompts, Capsule Memory entries, embeddings, API keys, billing identifiers). Controls scale with sensitivity.
Encryption
- In transit: TLS 1.2+ with modern ciphers.
- At rest: AES‑256 (cloud KMS) for databases, object storage, and backups.
- Secrets: Managed in a dedicated secrets manager; rotated routinely and on key events.
Access Controls
- Least‑privilege RBAC across infrastructure, code, and consoles.
- MFA required for admin and engineering accounts.
- Production access via break‑glass procedures with audit logging.
- Customer data access requires ticket, approval, and logging.
Application Security
- Peer review on PRs; dependency pinning and scanning.
- Static analysis and secret scans in CI.
- OWASP Top‑10 / ASVS‑informed reviews for new surfaces.
- Hardened security headers and Content Security Policy where applicable.
Infrastructure
- Cloud VPC segmentation, private subnets, WAF/security groups.
- Immutable builds/deploys; least‑privileged CI/CD runners.
- Encrypted backups; periodic restore tests.
- Observability with metrics, logs, traces, and anomaly alerts.
Availability & Resilience
- Multi‑AZ databases/storage; health checks and autoscaling.
- Documented incident response and disaster recovery runbooks.
- Tabletop exercises and post‑incident reviews.
Model Providers & Vendors
Where GENYS calls foundation models or uses cloud vendors, we vet security posture and data‑processing terms. A current subprocessor list is available on request at privacy@genys.ai.
Vulnerability Disclosure
Report suspected vulnerabilities to security@genys.ai with details and reproduction steps. We follow safe‑harbor principles for good‑faith research. Please do not access other users’ data or disrupt service.
- Scope: genys.ai, console, APIs, SDKs, public endpoints owned by GENYS.
- Out of scope: third‑party services not controlled by GENYS.
- We acknowledge valid reports and will keep you updated through remediation.
Compliance Roadmap
- SOC 2 Type I/II (roadmap; controls mapped internally).
- GDPR/CCPA‑aligned rights and DPAs on request.
- AI safety documentation and usage controls per feature.
Contact
GENYS AI Inc.
169 Madison Ave STE 15786
New York, NY 10016
security@genys.ai