HOW KEXTRACT™ MANAGES YOUR DATA
Security and Confidentiality
Confidentiality is a core principle of our service. Every stage of document processing is designed to minimise data exposure, ensure traceability, and return only the information necessary to the caller.
Document processing
Temporary Upload
Analysis and Extraction
Deletion of References
Alternatively, the "Maximum Protection" mode can be used, which performs the entire process without creating any temporary files.
For specific security requirements or data retention options, contact the team or request access to the playground.
Data protection in transit
- End-to-end encryption
All data is encrypted in transit using TLS 1.3 (TLS 1.2 supported for legacy applications) and stored temporarily with modern encryption algorithms to prevent unauthorized access. - Access control
Access is managed using role-based or minimum-privilege policies. API keys and credentials are managed through certified secret management systems. All API calls are authenticated with an API key, which defines the isolation context.
Storage, deletion, and guarantees:
Temporary storage
The storage used for processing is ephemeral: files are retained only for the duration strictly necessary for analysis.
Cancellation policy
All references and temporary files are automatically deleted at the end of the process. Complete deletion is guaranteed within 24 hours.
Data minimisation
We retain and process only the data necessary for the requested extraction. We do not store unnecessary copies or permanent backups of processed documents.
Monitoring, auditing, and accountability
Do you have any questions? Write to us at info@kextract.it
