Your data.
Your control.
Ansikt was built with privacy and security as foundational requirements, not afterthoughts.
Security-First Architecture
Every design decision prioritizes the protection of your data and the privacy of individuals in your photos.
Encryption in Transit and At Rest
All data is encrypted in transit using TLS 1.3. At-rest encryption is provided by our S3-compatible storage infrastructure using AES-256. Your images and face recognition data are protected at every step.
Face Recognition Data Isolation
Facial embeddings are stored separately from source images with additional access controls. Even if face data is accessed, it cannot reconstruct original photos.
Minimal Data Retention
Configurable retention policies with automatic purging. Set how long data is kept and let the system handle deletion automatically.
Continuous Improvement
We may use uploaded images to improve our face recognition models and algorithms. This helps us provide better accuracy and performance for all users.
Technical Specifications
Encryption
- At rest: AES-256-GCM
- In transit: TLS 1.3
- Secure key management with industry-standard practices
Infrastructure
- 100% EU-hosted data centers
- No US cloud providers
- Geographic redundancy within EU
Data Protection
Your data never leaves European jurisdiction.
100% EU-Hosted
All data stored in European data centers. No data transfers to the US.
No US Cloud Providers
We don't use AWS, Azure, or Google Cloud. Your data stays within EU-controlled infrastructure.
Data Sovereignty
Your data never leaves EU jurisdiction. Protected by EU privacy laws and regulations.
Role-Based Access Control
Granular permissions for different user types. Control who can search, view, export, or delete data.
SSO Integration
SAML 2.0 and OIDC support for enterprise authentication. Integrate with your existing identity provider.
Audit Logging
Complete activity logs for compliance reviews. Every search, view, and export is recorded with timestamps.
Session Management
Secure token-based authentication with automatic expiration. Sessions timeout after periods of inactivity.
Access Controls
Control who can access what. Enterprise-grade authentication and authorization built for organizations with strict security requirements.
GDPR Compliance Readiness
Designed from the ground up to support GDPR compliance.
Article 15
Right of Access
- Complete search across all connected sources
- Documented proof of comprehensive search
- Exportable reports for regulatory responses
Article 17
Right to Erasure
- Identify every photo of a data subject
- Automated deletion workflows
- Verification that deletion is complete
Article 30
Records of Processing
- Built-in processing activity documentation
- Automated record-keeping for facial recognition
- Clear data flow mapping
Our Commitment
We're a privacy company. That means:
No Data Sharing
We never share your data with third parties.
Privacy-Focused Analytics
We don't use Google Analytics or Facebook pixels. Any analytics we use are privacy-focused and EU-hosted.
Transparent Practices
Clear documentation of what we do with your data.
Data Minimization
We collect only what's necessary and delete what we don't need.