PeytonixAI is built for organizations that manage sensitive audit data in regulated environments. Your privacy is foundational to our architecture.
Last Updated: February 4, 2026
Core Principle
All audit evidence files are uploaded directly from user browsers to customer-owned cloud storage using secure, time-limited access mechanisms. PeytonixAI never receives, processes, or stores the contents of those files.
This policy applies to: Visitors to peytonixai.com, users of the PeytonixAI application, and customers, prospects, and support contacts. It does not apply to customer-owned data stored in customer-controlled infrastructure, as described below.
Data Collection
IP address, browser type and version, pages visited and interaction data, referral source. Used solely for website security, analytics, and performance monitoring.
Name, work email address, organization name, role and access level, authentication identifiers (e.g., SSO subject ID). Authentication is typically handled through the customer's identity provider.
Audit entities and hierarchies, control definitions, workpaper status, evidence references (object IDs, hashes, timestamps — not file contents), access logs and audit trails.
Contact information, support messages, and troubleshooting metadata when you contact us for assistance.
Privacy Boundaries
Data Usage
We use information only for the following purposes:
Your Control
Customers deploy and control their own infrastructure for evidence storage.
Customer-owned Amazon S3 buckets for all audit evidence files.
Customer-managed AWS KMS keys for encryption at rest.
Optional customer-controlled logging for independent audit trails.
Customer-selected regions and retention policies.
PeytonixAI accesses customer infrastructure only through explicit, customer-granted permissions, which can be revoked at any time.
Retention
PeytonixAI deletes customer metadata within contractually defined timeframes. Customers retain full control of their evidence storage and encryption keys.
Protection
PeytonixAI implements industry-standard security controls.
Detailed security documentation is available to customers under NDA. See our Security page for more information.
Third Parties
PeytonixAI uses a limited number of subprocessors to support service delivery, including cloud infrastructure providers, monitoring and alerting services, and optional AI services (disabled by default). A current list of subprocessors is available in our Trust Package.
PeytonixAI processes metadata in regions selected by the customer. Evidence files remain in customer-selected regions and accounts. Where applicable, appropriate safeguards are applied for international transfers.
Your Rights
Depending on your jurisdiction, you may have rights to:
Requests can be submitted via the contact information below. Requests related to customer data are handled in coordination with the customer organization.
Contact
We may update this Privacy Policy periodically. Material changes will be posted on this page with an updated effective date.