Security & Data Protection
Last Updated: 26 April 2026
Policies
stockinsights.ai is used for investment research workflows, APIs, and custom deployments that may involve customer datasets, internal materials, workflow configurations, and reviewable AI outputs. This page summarizes the security and data protection posture used by Serendib Labs Technologies Pvt Ltd.
Security Approach
Our security program is designed around practical controls for a cloud-based research and workflow automation product. We use safeguards intended to protect customer data, reduce unauthorized access, and maintain reviewability across product and workflow operations.
- Access controls for production systems and customer workspaces.
- Encryption in transit for web and API traffic.
- Role-aware handling of customer accounts, workflows, and organization access.
- Operational monitoring for reliability, errors, abuse, and security investigation.
- Vendor and provider review appropriate to the service being used.
Customer Data Handling
Customer data may include prompts, watchlists, generated outputs, uploaded files, private datasets, API logs, workflow configurations, and integration metadata. Customer data remains customer-owned and is processed to provide, secure, support, and improve the service.
We do not use customer inputs, private datasets, or outputs to train stockinsights.ai models or third-party foundation models.
Reviewability And Auditability
stockinsights.ai is built around reviewable outputs rather than automatic investment decisions. Workflows can be configured to surface source context, generated drafts, alerts, and intermediate outputs so users can review and validate results before acting on them.
Private Deployments And Custom Workflows
For PMS firms, AMCs, wealth teams, quant firms, and enterprise customers, custom deployments may involve customer-specific datasets, systems, permissions, provider settings, and output formats. Security, data retention, access, and support requirements can be documented in the applicable order form, statement of work, or enterprise agreement.
Third-Party Providers
We use third-party providers for infrastructure, model/API processing, analytics, payments, communication, logging, monitoring, and support operations. Provider categories are described on our Subprocessors / Third-Party Providers page.
Enterprise Security Review And DPA
Enterprise customers may request security review materials, subprocessor information, and a data processing agreement where appropriate. We do not publish a public DPA on the website at this time.
Report A Security Concern
If you believe you have found a vulnerability, unauthorized access, exposed credentials, or another security concern, contact support@stockinsights.ai with "Security" in the subject line. Please include enough detail for us to investigate.