Security & Data Protection

Last Updated: 26 April 2026

Policies

stockinsights.ai is used for investment research workflows, APIs, and custom deployments that may involve customer datasets, internal materials, workflow configurations, and reviewable AI outputs. This page summarizes the security and data protection posture used by Serendib Labs Technologies Pvt Ltd.

Security Approach

Our security program is designed around practical controls for a cloud-based research and workflow automation product. We use safeguards intended to protect customer data, reduce unauthorized access, and maintain reviewability across product and workflow operations.

  • Access controls for production systems and customer workspaces.
  • Encryption in transit for web and API traffic.
  • Role-aware handling of customer accounts, workflows, and organization access.
  • Operational monitoring for reliability, errors, abuse, and security investigation.
  • Vendor and provider review appropriate to the service being used.

Customer Data Handling

Customer data may include prompts, watchlists, generated outputs, uploaded files, private datasets, API logs, workflow configurations, and integration metadata. Customer data remains customer-owned and is processed to provide, secure, support, and improve the service.

We do not use customer inputs, private datasets, or outputs to train stockinsights.ai models or third-party foundation models.

Reviewability And Auditability

stockinsights.ai is built around reviewable outputs rather than automatic investment decisions. Workflows can be configured to surface source context, generated drafts, alerts, and intermediate outputs so users can review and validate results before acting on them.

Private Deployments And Custom Workflows

For PMS firms, AMCs, wealth teams, quant firms, and enterprise customers, custom deployments may involve customer-specific datasets, systems, permissions, provider settings, and output formats. Security, data retention, access, and support requirements can be documented in the applicable order form, statement of work, or enterprise agreement.

Third-Party Providers

We use third-party providers for infrastructure, model/API processing, analytics, payments, communication, logging, monitoring, and support operations. Provider categories are described on our Subprocessors / Third-Party Providers page.

Enterprise Security Review And DPA

Enterprise customers may request security review materials, subprocessor information, and a data processing agreement where appropriate. We do not publish a public DPA on the website at this time.

Report A Security Concern

If you believe you have found a vulnerability, unauthorized access, exposed credentials, or another security concern, contact support@stockinsights.ai with "Security" in the subject line. Please include enough detail for us to investigate.

Request an AI summary of stockinsights.ai

ChatGPT logoClaude logoPerplexity logoGrok logo

© 2026 Serendib Labs Technologies Pvt Ltd. All rights reserved.