PeytonixAI is built for organizations that manage sensitive audit data in regulated environments. Your privacy is foundational to our architecture.
Last Updated: April 1, 2026
Core Principle
PeytonixAI is designed for regulated environments. In production deployments, customer evidence files are stored in customer-controlled cloud infrastructure, and customers control the associated regions, retention settings, encryption keys, and logging configurations. PeytonixAI may handle upload orchestration, validation, malware scanning, and metadata creation as part of delivering the service.
This policy applies to: Visitors to peytonixai.com, users of the PeytonixAI application, and customers, prospects, and support contacts. For customer-controlled infrastructure, this policy works alongside the applicable customer agreement and the deployment controls configured by the customer.
Data Collection
Website hosting and security infrastructure may generate logs such as IP address, browser or user-agent details, requested pages, referral source, and basic performance or interaction data used for website security, delivery, and service monitoring.
If you request a demo or contact PeytonixAI through the website, we collect the information you submit, which may include your name, work email address, company name, current audit system, and timeline details.
Name, work email address, organization name, role and access level, authentication identifiers (e.g., SSO subject ID). Authentication is typically handled through the customer's identity provider.
Audit entities and hierarchies, control definitions, workpaper status, automated test definitions, execution history, exception and AI-review metadata, evidence references (object IDs, hashes, timestamps, and related metadata rather than the business purpose of the underlying file), access logs, and audit trails.
Contact information, support messages, and troubleshooting metadata when you contact us for assistance.
Privacy Boundaries
Customer evidence is intended to remain in customer-controlled storage. Depending on deployment and workflow, PeytonixAI may process file transfers, scan uploads for malware, or generate metadata needed to secure and operate the application. When AI features are enabled, prompts and outputs may be processed by the customer-selected provider under the customer's agreement with that provider.
Data Usage
We use information only for the following purposes:
Your Control
For production deployments, customers control the core infrastructure boundaries for regulated data handling.
Customer-owned Amazon S3 buckets for all audit evidence files.
Customer-managed AWS KMS keys for encryption at rest.
Customer-controlled audit logging and object access logging are part of the baseline deployment model.
Customer-selected regions and retention policies.
PeytonixAI accesses customer infrastructure only through explicit, customer-granted permissions configured for the deployment. Customers retain control over storage boundaries, keys, and logging within their environment.
Retention
PeytonixAI handles return, deletion, or anonymization of provider-controlled data according to the applicable customer agreement and legal requirements. Customers retain control of their evidence storage, encryption keys, and related customer-managed resources.
Protection
PeytonixAI implements industry-standard security controls.
Detailed security documentation is available to customers under NDA. See our Security page for more information.
Third Parties
PeytonixAI uses a limited number of subprocessors to support service delivery, including cloud infrastructure providers, monitoring and alerting services, and AI providers where enabled for a deployment. A current list of subprocessors is available through our trust and security review process.
In customer-hosted production deployments, application metadata is processed within the customer's configured runtime environment, and evidence files remain in customer-selected regions and accounts.
Website, demo-request, sales, and support data may be processed in PeytonixAI-operated systems or by service providers used to operate the website and respond to inquiries. Where applicable, appropriate safeguards are applied for international transfers.
Your Rights
Depending on your jurisdiction, you may have rights to:
Requests can be submitted via the contact information below. Requests related to website, demo-request, sales, and support data are handled by PeytonixAI. Requests related to customer-controlled runtime data are handled in coordination with the relevant customer organization and the applicable customer agreement.
Contact
We may update this Privacy Policy periodically. Material changes will be posted on this page with an updated effective date.