Trust & Security

Your product intelligence stays yours

Gravii is built for teams that handle sensitive product and customer data. Here's exactly how we protect it.

Data Flow

What happens to your data

1

You share context

Meeting notes, emails, or transcripts. Pasted manually or forwarded via email. Nothing is collected automatically.

2

AI extracts intelligence

Sent to Anthropic Claude using your own API key (BYOK). Zero data retention on Anthropic's side. The raw text exists in server memory only during processing (10-30 seconds), then it's discarded. Only structured entities and signals are kept.

3

Intelligence is stored

Extracted entities, signals, and relationships are stored in your org's isolated database in Frankfurt. The original transcript is never persisted.

Security

What's in place today

EU hosting

All data stored in Frankfurt (eu-central-1). No US data transfer for storage.

Bring Your Own Key

Use your own Anthropic API key. AI calls go directly to Anthropic under their zero data retention policy. Gravii never sees your prompts or responses.

Org isolation

Row-level security enforced at the database level on every table. Your data is invisible to other organizations.

No training on your data

Gravii doesn't train models. With BYOK, Anthropic's zero retention policy means your content isn't used for training either.

Infrastructure

Built on infrastructure you already trust

Supabase

SOC 2 Type II. Database and auth.

Vercel

SOC 2 Type II. Application hosting.

Anthropic

Zero data retention API. AI processing.

Cloudflare

SOC 2 Type II. DNS, email routing, edge security.

Roadmap

What's coming

Data Processing Agreement (DPA)This month
GDPR data export and deletionThis month
Data access audit logQ2 2026
SOC 2 Type I2026

Transparency

What we're upfront about

During AI processing, your transcript exists in cleartext in server memory for 10-30 seconds. After extraction, only structured data is stored. With BYOK, Anthropic never retains the content.

Gravii is an early-stage product. We don't have SOC 2 yet, but every infrastructure provider we depend on does. We're building security into the architecture from day one.

Have a security question? Reach out directly.