Data security & privacy
are our top priority
How Liminary works with your data
The summary
Enterprise-grade security practices
Trusted data privacy guidelines
Building a human-centric product
Our security certifications
Our security & privacy features

Enterprise agreements with foundation models
Our agreements with third-party AI models (eg foundation LLMs) prevent user data from being used to train or enhance their performance.

Sensitive data redaction
As part of our architecture, we trigger a redaction process as soon as your data arrives in our environment. This works for data in text as well as images.

Need-to-know access control
Multi-factor authentication required, least-privilege principle, and role-based permissions for all system access

Data encryption
All Liminary customer data is encrypted at rest and in motion using TLS 1.2 and 1.3.

Monthly security reviews
Monthly security reviews and access audits by senior Eng leadership. Every employee undergoes security training.

User control over personal data
Easy ability to delete personal data or your entire Liminary account