Home / Security & Compliance
Security & Compliance Posture

Confidentiality discipline. Scope perimeter. Evidence-tag trail.

The platform operates inside a defined trust perimeter: what it does, what it deliberately withholds, and how it leaves a traceable record of every decision.

Three Trust Foundations

Discipline that cannot be relaxed under user pressure.

01

Governance-locked operating rules

Non-negotiable governance rules. User requests, contextual pressure or infrastructure changes do not relax them.

02

Full-Chain execution

Once context and profile are set, the evaluation chain activates automatically and every stage is executed. The question "which step was skipped?" no longer arises.

03

External verification

Critical claims are verified against public sources in addition to in-file evidence. Official, institutional and secondary sources are segmented by confidence level.

Evidence-Tag System

Every assertion has a provenance.

The platform tags each piece of analytical content against an evidence tier — making the provenance of every assertion visible to the committee. This is the foundation of a natural compliance trail.

BASE-#

In-file claim

A statement made within the file by the founder or applicant.

EXT-#

External verification

A claim confirmed against public, regulatory or institutional sources.

LINK-#

Source link

A specific public-source URL or filing reference supporting a finding.

NOTE-#

Analyst note

A platform-side observation or interpretation — clearly distinguished from claims and verifications.

Confidentiality Discipline

What stays inside the engine.

  • Full workflow texts — reusable internal logic and calibration maps are not exposed in outputs.
  • Governance-extension content — the operational content of the 20 extension libraries is not disclosed; only the architectural role.
  • Complete criteria list — the full 1,000-criteria library is not released.
  • Calibration matrices — the context-based block-weight matrix and profile-based evidence thresholds remain internal.
  • Internal operational maps — reusable decision matrices, the BLOCK × context mapping and tooling references are held inside the platform.
Why this matters Disclosure of the operational layer would convert the platform from a decision governance system into a static checklist — losing the auditability, calibration discipline and reproducibility that the architecture provides.
Scope perimeter

The platform operates within a defined trust perimeter:

  • Not legal advice
  • Not investment advice
  • Not statutory audit
  • Not a binding regulatory opinion
  • Not tax, credit or insurance underwriting
  • Does not conduct personal-data research
  • Does not produce a binding investment decision
  • Provides decision support to the committee only
For client and engagement data, the platform operates under standard institutional confidentiality discipline. Specific data-processing arrangements are agreed on a per-engagement basis.