AlphaGen logo AlphaGen
Problem Solution About Legal Contact
Problem Solution About Legal Contact us
← Legal Documents

On this page

  • Trust & Security
Version1.0.0
CategoryPolicy

Policy

trust-security

Trust & Security

AlphaGen Holdings Limited ("AlphaGen")

Companies House no. 17084844 — registered in England and Wales

Effective date: 2026-04-27

Version: 1.0.0

Contact: security@alpha-gen.ai (incidents) ·

trust@alpha-gen.ai (programme questions)

This page summarises AlphaGen's security and trust posture. It

is the public-facing companion to the internal **Information

Security Policy** and the technical-and-organisational measures

(TOMs) annexed to the Data Processing Addendum.

Enterprise customers can request the full security pack

(architecture diagrams, control matrix, audit reports) via NDA.

---

1. Architecture overview

AlphaGen runs on a multi-cloud, region-pinned infrastructure.

A Customer's data is processed only in the region(s) declared on

their Order Form (UK, EU, or — by exception — US). Cross-region

processing requires explicit Customer authorisation.

The system is composed of:

  • A Pass 0 redaction pipeline that removes faces, voice, OCR

text, license plates, and screens from raw video before any

downstream component (or any human) sees the content.

  • A detection / propagation pipeline built on a private

fork of the open Cutie / XMem / SAM3 mask-propagation engines,

hardened for production.

  • A world-state synthesis layer that calls third-party LLMs

(Anthropic Claude, OpenAI GPT) under contract with the

customer-data-not-used-for-training clause.

  • A HITL platform (web dashboard + mobile app) where vetted

operators correct mistakes and improve the models.

  • A per-customer LoRA fine-tuning system that lets each

Customer's domain-specific corrections improve their own

models without leaking corrections to other Customers.

For a comprehensive technical architecture, see

docs/architecture.md.

---

2. Encryption

| Layer | Algorithm | Key management |

|---|---|---|

| Data at rest (object storage, databases, backups) | AES-256-GCM | AWS KMS / GCP KMS by default; Customer-managed keys (HYOK) available on Enterprise tier |

| Data in transit (external) | TLS 1.2+ (TLS 1.3 preferred) | Public CA certificates, automated rotation |

| Data in transit (internal cluster) | mTLS | Internal CA, certificates rotated every 30 days |

| Database column-level (audit logs, hashed identifiers) | Application-layer AEAD | Per-tenant key isolation |

| Backups | AES-256-GCM | Same KMS as primary, separate key alias for rotation |

We do not store raw Customer footage unencrypted at any

stage of the pipeline.

---

3. Access control

3.1 Authentication

  • All operator and developer accounts require **multi-factor

authentication** with TOTP or hardware-backed WebAuthn.

  • AlphaGen staff use SSO via the corporate identity provider

(Okta / Microsoft Entra ID) with mandatory MFA.

  • Service-to-service authentication is via short-lived

workload-identity tokens; long-lived secrets are not used in

production.

3.2 Authorisation

  • Role-based access control (RBAC) with least-privilege

defaults at every layer.

  • **Customer Personal Data is not accessible to AlphaGen staff

by default.** Engineers do not have standing read access to

production data. Break-glass access requires:

1. A documented incident or support ticket;

2. Approval by an on-call manager;

3. Time-boxed (≤4 hours) elevated session;

4. Full audit-log entry visible to the Customer on request.

  • HITL operators see pixels only. Subject identifiers are

joined server-side; the operator never receives a real name,

email, or other direct identifier.

3.3 Audit

Every privileged action — login, configuration change,

break-glass access, sub-processor change, deletion, export — is

recorded in a cryptographically chained audit log. The chain

is hashed daily; tampering is detectable. Audit log access is

restricted to the DPO, the Head of Security, and named auditors.

---

4. Data lifecycle

| Phase | Behaviour |

|---|---|

| Ingest | Customer uploads raw video over TLS. Pass 0 runs in a sandboxed compute environment with no outbound network access except to the encrypted object store. |

| Redaction | Faces, voice, OCR text, license plates, and screens are blurred / masked / replaced before storage. The redaction manifest is signed and audit-logged. |

| Storage | Redacted footage is encrypted at rest. Raw footage is deleted within 30 minutes of successful Pass 0 (default; configurable per consent scope). |

| Processing | Detection / propagation / synthesis run on the redacted footage. No production component touches raw footage. |

| HITL | Operators see redacted pixels. Server-side subject linkage joins corrections to the data subject for downstream consent enforcement. |

| Export | Customer exports go through the Customer's authenticated session; export events are logged. Export region matches the Customer's pinned processing region by default. |

| Deletion | A delete instruction cascades to every store, cache, log pipeline, and backup tombstone. Backup tombstones cycle out within 90 days. |

---

5. Network and infrastructure security

  • Edge: DDoS protection (Cloudflare or equivalent), rate

limiting, WAF rules tuned for our API surface.

  • Network segmentation: public / private / restricted

subnets; production databases are not internet-accessible;

egress filtering on each compute tier.

  • Bastion-less access: AlphaGen engineers connect to

production via a zero-trust proxy (Tailscale / Cloudflare

Access) with device-posture checks; no SSH keys distributed

to laptops.

  • Vulnerability management: automated container-image

scanning on every build; weekly dependency-update PRs;

critical CVEs patched within 24 hours of vendor patch

availability, high CVEs within 7 days.

  • Secret management: secrets in HashiCorp Vault; never in

source code, never in container images.

---

6. Software supply chain

  • All production code is signed and built reproducibly through

CI.

  • Third-party dependencies are pinned and scanned (SCA via

Snyk / Dependabot equivalent) on every build.

  • A signed SBOM is produced for each release and stored

alongside the release artefact.

  • Container base images are sourced from distroless or hardened

upstreams; updated on a fixed cadence.

---

7. Incident response

AlphaGen operates a 24/7 on-call rota for security and

availability incidents. The runbook is at the internal

docs/legal/privacy/operational/breach-playbook.md and includes:

  • Classification: P0 (data breach / outage) → P3 (low-impact

bug) with response time SLAs.

  • Containment: stop-the-bleed actions per incident type.
  • Forensics: evidence-preservation steps for legal hold.
  • Notification: Customer notification within 48 hours of

any Personal Data Breach affecting Customer Personal Data

(per DPA §4.5). Regulator notification per Article 33 UK GDPR.

  • Post-mortem: blameless review; root-cause and corrective

actions tracked through to closure.

External vulnerability reports are welcomed at

security@alpha-gen.ai; we do not currently operate a paid bug

bounty but do publicly thank reporters in our security advisory

feed.

---

8. Resilience and continuity

  • Backup cadence: continuous WAL streaming + daily encrypted

snapshots of the primary database; weekly + monthly snapshots

retained per regulatory horizon.

  • Restore testing: quarterly full-restore drill into an

isolated staging environment; restore time objective (RTO) ≤

4 hours, recovery point objective (RPO) ≤ 15 minutes for the

primary tier.

  • Multi-AZ: production runs across at least two availability

zones in each region.

  • Failover region: pre-warmed for the EU and UK regions;

US is cold-standby on default Order Forms.

  • Business continuity plan: annually rehearsed; covers

scenarios from individual-component failure through full

region loss.

---

9. Compliance and certification

| Programme | Status |

|---|---|

| UK GDPR / EU GDPR | Fully implemented; DPO appointed; RoPA maintained. See Privacy Policy. |

| Cyber Essentials Plus (UK NCSC) | Targeted for 2026 Q3. |

| ISO/IEC 27001:2022 | Roadmap to certification 2027 Q2; gap-analysis complete; SOA in draft. |

| SOC 2 Type II (AICPA) | Type I targeted 2026 Q4; Type II 2027 Q3. |

| HIPAA | Available under signed BAA for healthcare Customers; AlphaGen is not currently HIPAA-listed by HHS. |

| Modern Slavery Act 2015 | Modern Slavery Statement published voluntarily; AlphaGen is below the £36 m statutory threshold. |

| DMCC Act 2024 | AI Transparency page published; no live chatbot at the time of writing. |

| WCAG 2.2 AA | Accessibility Statement — partially conformant pending advanced-visualisation remediation. |

The current attestation status is dated below; refer to the

audit report when available.

---

10. Sub-processors

The current list is at

docs/legal/privacy/subprocessors.md. We notify Customers of

new sub-processors at least 30 days in advance. Customers can

object to a new sub-processor on reasonable data-protection

grounds; if no mitigation can be agreed, the affected Order Form

may be terminated for convenience under the Master Agreement.

---

11. Customer-managed controls

Enterprise Customers can opt into:

  • Customer-managed encryption keys (HYOK): Customer holds

the KMS root; AlphaGen wraps data keys under that root. Key

revocation cuts off AlphaGen access immediately.

  • Region pinning: processing restricted to UK or EU only;

cross-region failover requires explicit consent.

  • Sub-processor restriction: Customer can pre-approve a

subset of the sub-processor list (e.g. Anthropic only, no

OpenAI).

  • No-training clause: Customer Data is never used for any

cross-Customer model training; opt-in only at the Customer's

discretion (see Responsible AI Policy).

  • Data-residency attestation: quarterly report demonstrating

that no Customer Personal Data left the pinned region(s) in

the last quarter.

---

12. Personnel security

  • Background checks (BPSS-equivalent or higher for staff

with privileged access) on hire.

  • Annual security training, reinforced with role-based

modules (developer secure-coding, DPO data-protection

refresher, on-call incident-response drills).

  • Joiner / mover / leaver procedure documented and audited;

access is provisioned least-privilege at start and revoked

within 1 business hour of departure.

  • Confidentiality agreements signed by every staff member

with access to production data or Customer Personal Data.

---

13. Reporting and disclosure

We publish:

  • Security advisories for any vulnerability we patch that

could materially affect Customer security, including a CVE

ID where applicable, on a dedicated advisory feed.

  • Incident retrospectives for any Customer-impacting P0/P1

incident, on the same feed (subject to legal review for

ongoing matters).

  • Quarterly trust report with high-level metrics (MFA

coverage, CVE patch SLAs, sub-processor changes).

---

14. Contact

  • Reporting a vulnerability: security@alpha-gen.ai (PGP key

on the website's /security.txt).

  • Customer security questions: trust@alpha-gen.ai (we

reply within 5 business days).

  • Emergency / suspected breach affecting your data: `security

@alpha-gen.ai` with subject "URGENT — Personal Data Breach"

triggers our 24/7 on-call.

---

Document control

| Version | Date | Author | Notes |

|---|---|---|---|

| 1.0.0 | 2026-04-27 | AlphaGen Security & Legal | Initial publication. Public summary; Enterprise customers receive full pack under NDA. |

  • Legal Documents

AlphaGen Holdings Limited · Registered in England & Wales · hello@alpha-gen.ai