Security and Data Handling
Our approach to data protection, compliance alignment, and operational security.
Public Form Data
All form submissions are transmitted over TLS-encrypted connections. Form data is processed by Netlify and stored in accordance with their data processing agreement. No form data is shared with third parties. Contact information is used solely for responding to inquiries.
NDA Process
Technical artifacts, validation data, and detailed research findings are available under mutual NDA. Typical turnaround for NDA execution is 48-72 hours. Request an NDA packet through our contact form by selecting “Request NDA Packet” as the engagement type.
Data Retention
We retain business correspondence and contact information for the duration of the business relationship. No personal data is collected beyond what is voluntarily provided through our contact form. We do not use tracking cookies or third-party analytics.
Architecture Security Posture
AriaOS operates offline-first by design. Data never leaves operator infrastructure during normal operation. All inference, governance, and audit functions execute locally.
- Full audit trail for all agent decisions and actions
- Pre-inference compliance enforcement
- No telemetry or phone-home capabilities
- Cryptographic validation for model updates
- Air-gap compatible by default
Compliance Alignment
NIST 800-171 Aligned
Security controls aligned with NIST SP 800-171 for protecting controlled unclassified information. Implementation documentation available under NDA.
ITAR-Aware
International Traffic in Arms Regulations awareness integrated into data handling procedures. All personnel are U.S. persons. No foreign national access to controlled technical data.
CUI Handling
Procedures established for handling Controlled Unclassified Information. Appropriate marking, storage, and transmission protocols in place.
What We Do Not Have
In the interest of transparency, the following certifications and authorizations are not currently held:
- FedRAMP Authorization
- CMMC Certification
- Impact Level (IL) Authorization
- SOC 2 Type II
These are documented honestly. We do not overclaim compliance posture. If your engagement requires any of these certifications, we will discuss feasibility and timeline during initial consultation.
Vulnerability Disclosure
If you discover a security vulnerability in any ResilientMind AI system or website, please report it through our contact form. Select “General Inquiry” as the engagement type and include “Security Disclosure” in the subject of your message. We take all reports seriously and will respond within 48 hours.
Report a Vulnerability