← Back to home
Data Privacy

Privacy options for organizations that need tighter control

We care about privacy. The Accessible Org should be usable in a way that matches your security, compliance, and deployment requirements.

This page explains how customers can use the service securely today, what stronger privacy controls we intend to support, and the implementation plan required to deliver them.

Last updated: April 3, 2026Read the Privacy Policy

Privacy control ladder

Customers can choose increasing levels of control. Some of these options are available now and some are roadmap items. The point is to make the tradeoffs explicit instead of pretending every deployment has the same privacy needs.

1

Use your own storage

Planned

Under Settings, customers will be able to provide credentials for compatible S3 storage so source files and outputs live in their own bucket. Without hosted storage enabled, we should have no access to documents after processing completes.

2

Build on our API

Available today

Teams that need tighter control can use the API directly and build their own front end, workflow, or portal on top of the same conversion backend we use internally.

3

Run the stack in your AWS account

Planned

For organizations with stricter controls, we will provide a CDK deployment and coordination layer so the full processing path runs inside the customer’s AWS environment and we never see the data.

4

Run the stack with Docker

Planned

For self-managed environments, we plan to offer a Docker-based deployment option so customers can run the service in their own infrastructure and manage network, storage, and retention locally.

5

Bring your own LLM keys

Planned

Customers will be able to provide their own model keys. As long as one compatible vision-capable AI model is available, the pipeline can route image and layout analysis through customer-controlled providers.

Baseline we design for

Even in the hosted model, our privacy posture should follow standard secure SaaS practices.

  • Encrypted transport for every upload, API call, and webhook.
  • Least-privilege access between services, storage, and model providers.
  • Short-lived processing data with explicit retention controls.
  • No customer files used to train models.

Implementation plan

These are the product and platform changes needed to make the privacy model real.

  1. 1Add a storage connector in Settings for S3-compatible buckets, validation checks, and customer-managed retention policies.
  2. 2Document the API as a first-class private deployment surface, including auth, webhooks, rate limits, and reference front-end flows.
  3. 3Ship an AWS reference architecture with CDK, isolated queues, customer-owned storage, and environment-specific secrets management.
  4. 4Package a Docker deployment with worker orchestration, health checks, model-provider configuration, and upgrade guidance.
  5. 5Support customer-supplied LLM and vision keys with routing rules, provider health checks, and audit-friendly configuration exports.