Your stories are safe with us.
Security isn't an afterthought at PlotLens. We've built our platform from the ground up to protect your creative work.
Our Security Principles
Your Content Is Yours
We never use your manuscripts, characters, or worlds to train AI models. Your creative work remains completely private and under your control.
Encryption Everywhere
All data is encrypted in transit using TLS 1.3 and at rest using AES-256. Your content is protected from the moment you upload it.
You Control Your Data
Export your data anytime. Delete your account and we'll remove your data within 30 days. You're always in control.
Technical Security Measures
Infrastructure Security
PlotLens runs on enterprise-grade cloud infrastructure with SOC 2 Type II certification. All servers are in secure, monitored data centers.
Access Controls
Role-based access controls, multi-factor authentication, and detailed audit logs ensure only authorized users can access your data.
Regular Audits
We conduct regular security assessments and penetration testing. Vulnerabilities are addressed promptly.
Secure Development
Our development practices follow OWASP guidelines. All code is reviewed for security vulnerabilities before deployment.
Backup & Recovery
Automated backups ensure your data is protected. Our disaster recovery plan ensures minimal downtime.
How We Handle AI Processing
PlotLens uses AI to extract entities and validate your canon. Here's how we protect your content during this process:
- No training on your content: Your manuscripts are never used to train or fine-tune AI models.
- Processing only: AI providers process your content for extraction and validation, then discard it. Nothing is retained.
- Data processing agreements: We have strict DPAs with AI providers that prohibit using your content for any purpose beyond providing the service.
- BYOK option: Enterprise customers can bring their own API keys for complete control over AI processing.
Enterprise Security
Additional security features for teams and organizations
SSO/SAML
Single sign-on integration with your identity provider
Audit Logs
Comprehensive logs of all activity for compliance
Custom Roles
Fine-grained permissions for your team
On-Premise
Deploy in your own infrastructure
Security Questions?
We're happy to answer any questions about how we protect your data.