Insightek.ai
Legal · Trust

Security & Data Handling

The controls, processes, and honest status of our security program — written for enterprise security, procurement, and IT reviewers.

Effective date: 2026-04-08

Notice This page reflects the state of our security program as of 2026-04-08. We deliberately use status labels instead of the word "certified" when certificates are not yet issued. Where verification is required for procurement, please request our security questionnaire response under NDA.

01

Our security philosophy

Insightek builds industrial AI products that run on or near customer production lines. That context shapes every security decision we make: customer imagery and operational data must be protected, data sovereignty must be respected, and the line must continue to run even when connectivity to external services is interrupted. We design for on-premise and hybrid deployments as the default, not as an afterthought.

We favor transparency over marketing language. Where a control is fully in place, we say so. Where a certification is in progress, we say "in progress" and explain what that means. We do not use the word "certified" in the absence of an actual certificate.

02

Data sovereignty

For on-premise deployments, customer imagery, detections, and operational logs remain on the customer network. The inference pipeline does not require outbound connectivity to Insightek infrastructure to make real-time decisions. Software updates and model updates are delivered through controlled channels that the customer can inspect and schedule.

For hybrid or cloud-assisted deployments, we document exactly which data flows leave the customer perimeter, why, and under what legal basis. Customers can opt into a fully air-gapped mode where no operational data ever leaves their network.

03

Encryption

Data in transit. All network traffic between product components is encrypted using TLS 1.2 or above with modern cipher suites. Internal service-to-service traffic uses mutual TLS where supported by the customer environment.

Data at rest. Stored detection records, model artifacts, and audit logs on Insightek-managed infrastructure are encrypted using AES-256. On customer-managed infrastructure, we recommend and help configure equivalent at-rest encryption using the customer's key management solution.

Keys and secrets. Keys and secrets are managed through the platform-native secret store (for example a customer KMS or HSM where available). We avoid long-lived static credentials and rotate keys on a defined schedule.

04

Access control

Role-based access control (RBAC) is enforced throughout the product interface. Roles follow the principle of least privilege: operators see only the data and actions required for their station; engineers see configuration and logs; administrators manage users and policies.

Single sign-on (SSO) integration with customer identity providers (SAML and OIDC) is on the roadmap and available today for enterprise engagements on request. Until a customer integration is in place, we support strong passwords and recommend enabling multi-factor authentication at the customer's identity layer.

Insightek personnel access to customer environments is strictly limited to engineering and support staff with a documented need-to-know, requires explicit customer authorization, and is recorded in audit logs.

05

Audit logging

The product emits structured audit logs for authentication events, configuration changes, model deployments, and privileged actions. Logs are tamper-evident — each entry is chained so that retroactive modification is detectable — and retention is configurable to match the customer's compliance requirements.

Logs can be forwarded to the customer's SIEM or log aggregation system in standard formats for integration with existing monitoring and alerting workflows.

06

Incident response

We maintain an internal incident response process covering detection, containment, eradication, recovery, and post-incident review. Suspected security incidents affecting customer environments are escalated to a named on-call engineer and an incident commander.

Notification commitment. In the event of a confirmed security incident affecting customer data or customer operations, we commit to notifying affected customers without undue delay and no later than 72 hours after discovery, consistent with regulatory standards under GDPR and PIPL. The notification will include what we know, what we do not yet know, actions already taken, and next steps.

For coordinated vulnerability disclosure from external researchers, please see the "Reporting a vulnerability" section below.

07

Data minimization

We believe the most privacy-preserving data is the data never captured. Our Action Compliance product supports a structure-only mode in which the system emits events and metrics (timestamps, step labels, sequence compliance flags) without storing or transmitting the raw video frames that generated them. This mode is suitable for workplaces where continuous video capture would raise privacy concerns.

Our Visual Inspection product supports configurable retention of inspection images, including modes where only failures are retained for review and successful inspections are discarded immediately after the OK/NG decision.

Compliance roadmap
08

Certifications & compliance roadmap

We publish the real state of our certification program, not what we aspire to. If you need third-party verification for procurement, we can share evidence artifacts under NDA.

Standard Status What this means today
ISO 27001 (Information security) In progress Internal controls framework established and mapped to Annex A controls; external audit in planning. No certificate yet — we will not call this "certified" until we hold one.
SOC 2 Type II In progress Readiness assessment complete. Policies and operating effectiveness evidence being collected; attestation engagement in planning.
GDPR (EU / UK) In progress Policy framework and data processor alignment in progress. DPA template available to enterprise customers on request.
PIPL (China) In progress Compliance review underway in alignment with PRC data protection requirements for industrial customers.
ISO 9001 (Quality management) In progress Quality management alignment underway alongside our manufacturing customers' own QMS requirements.
09

Reporting a vulnerability

We welcome coordinated disclosure from security researchers, customers, and partners. If you believe you have discovered a security issue in our website, products, or infrastructure, please contact us at the security email address below with a description of the issue, steps to reproduce where possible, and any affected components.

We commit to acknowledging the report within 3 business days, working in good faith to validate the finding, and keeping the reporter informed of our progress. We ask that reporters give us a reasonable window to remediate before public disclosure and that they refrain from testing that could disrupt customer operations or access customer data.

We do not currently operate a public bug bounty program. For responsible researchers, we are happy to provide written acknowledgment of valid findings and, where appropriate, coordinate disclosure timing with the affected customer.

10

Sub-processors

We work with a limited set of vetted sub-processors to deliver our services. Current categories include cloud hosting and content delivery; transactional email delivery; business communications and calendaring; customer relationship management; and observability and error monitoring.

A named sub-processor list is available to enterprise customers on request, and material changes are notified in advance to customers under a data processing agreement. For on-premise deployments where operational data remains on the customer network, the Insightek sub-processor list does not apply to the customer's operational data path.

Contact

Security contact (interim)

Legal entity
Suzhou Insightek Technology Co., Ltd.
Email
jacky.weng@insightek.ai
Address
Suzhou, Jiangsu, People's Republic of China