Data security & privacy
are our top priority
The summary
Enterprise-grade security practices
We built Liminary from the ground-up following best practices in data security to prevent unauthorized data access, corruption or theft
Trusted data privacy guidelines
From Day 1, we've been carefully thinking about how we collect, store and use user data to respect individual rights and ensure responsible usage.
Building a human-centric product
One of our core beliefs is that AI should augment, not replace, humans. We believe in that unique human spark and aim to keep that central to the product experience.
Cloud Application Security Assessment
CASA
...and more in the works
Our security & privacy features
Enterprise agreements with foundation models
Our agreements with third-party AI models (eg foundation LLMs) prevent user data from being used to train or enhance their performance.
Sensitive data redaction
As part of our architecture, we trigger a redaction process as soon as your data arrives in our environment. This works for data in text as well as images.
Need-to-know access control
Multi-factor authentication required, least-privilege principle, and role-based permissions for all system access
Data encryption
All Liminary customer data is encrypted at rest and in motion using TLS 1.2 and 1.3.
Monthly security reviews
Monthly security reviews and access audits by senior Eng leadership. Every employee undergoes security training.
User control over personal data
Easy ability to delete personal data or your entire Liminary account
Key documents
Security Policy
Privacy Policy
Chrome Extension
Data Policy