Your stories are safe with us.

Security isn't an afterthought at PlotLens. We've built our platform from the ground up to protect your creative work.

Our Security Principles

Your Content Is Yours

We never use your manuscripts, characters, or worlds to train AI models. Your creative work remains completely private and under your control.

Encryption Everywhere

All data is encrypted in transit using TLS 1.3 and at rest using AES-256. Your content is protected from the moment you upload it.

You Control Your Data

Export your data anytime. Delete your account and we'll remove your data within 30 days. You're always in control.

Technical Security Measures

Infrastructure Security

PlotLens runs on enterprise-grade cloud infrastructure with SOC 2 Type II certification. All servers are in secure, monitored data centers.

Access Controls

Role-based access controls, multi-factor authentication, and detailed audit logs ensure only authorized users can access your data.

Regular Audits

We conduct regular security assessments and penetration testing. Vulnerabilities are addressed promptly.

Secure Development

Our development practices follow OWASP guidelines. All code is reviewed for security vulnerabilities before deployment.

Backup & Recovery

Automated backups ensure your data is protected. Our disaster recovery plan ensures minimal downtime.

How We Handle AI Processing

PlotLens uses AI to extract entities and validate your canon. Here's how we protect your content during this process:

  • No training on your content: Your manuscripts are never used to train or fine-tune AI models.
  • Processing only: AI providers process your content for extraction and validation, then discard it. Nothing is retained.
  • Data processing agreements: We have strict DPAs with AI providers that prohibit using your content for any purpose beyond providing the service.
  • BYOK option: Enterprise customers can bring their own API keys for complete control over AI processing.

Enterprise Security

Additional security features for teams and organizations

SSO/SAML

Single sign-on integration with your identity provider

Audit Logs

Comprehensive logs of all activity for compliance

Custom Roles

Fine-grained permissions for your team

On-Premise

Deploy in your own infrastructure

Security Questions?

We're happy to answer any questions about how we protect your data.