FAQ
Answers designed for Ops, Security, Compliance, and Procurement stakeholders.
No. The platform performs ephemeral extraction to produce structured outputs. Training is not performed on customer data.
Policy-based mandatory review enforces approval automatically. Bypass flags are for demo/testing only and should be disabled in production.
No. Universal Data Bridge operates at the UI layer. It does not require database access to legacy systems.
Audit packs contain SHA-256 hashes and signatures over the manifest, plus a regulator verification guide that uses standard tools like OpenSSL.
In production, customers should use their own keys stored in KMS/HSM (AWS KMS default). Local keys are for pilots and demos.
Yes. Enterprise deployments can run in restricted networks. Model routing and storage can be controlled based on policy.