Trust Center
How InsightGig Keeps Your Research Safe, Private, and Under Your Control
What this page covers
InsightGig is built for insight teams working with sensitive research, proprietary data, and high-stakes decisions.
This Trust Center explains how InsightGig protects your data, how AI interacts with your research, who owns your data, how long it’s retained, and how we meet enterprise security and privacy expectations.
Security at a glance
- All data is encrypted in transit and at rest
- Your data is never used to train public or shared AI models
- Access is permission-based and logged
- You retain full ownership of your data
- Data can be exported or deleted at any time
- Practices align with GDPR and enterprise requirements
Built Secure from the Start
InsightGig is designed with security at its core.
- The Operating Layer is built on dedicated, secure cloud infrastructure with protections embedded at every layer.
- Your data is safeguarded by preventative controls designed to stop issues before they start.
Access Is Limited. By Design.
Only the right people see the right data.
- Access is login-based and controlled through two-factor authentication.
- Our access to your data is restricted, logged, and used only to provide services.
Your Data Belongs to You
Run proprietary, client, or competitive research without losing control.
- Everything you upload, analyze, or generate remains your intellectual property.
- Your data is processed only to deliver the services you request, and ownership never changes, even after your engagement ends.
How AI Works with Your Data
InsightGig’s AI works only within your workspace and only when you ask it to.
- Your data is used solely to generate requested outputs and is never shared across customers or used to train public or shared models.
- AI supports synthesis and analysis, while humans retain judgment and decision ownership.
Enterprise Readiness Without the Friction
InsightGig is designed to meet enterprise security and privacy expectations without adding operational complexity.
- Our data handling aligns with GDPR requirements.
- We support DPAs, NDAs, and procurement-ready documentation.
- Controls are designed to satisfy IT and legal teams without slowing researchers.
If Something Goes Wrong Despite all Precautions
We have documented incident response procedures and continuous monitoring in place.
If a security incident is confirmed, affected customers are notified within 72 hours with clear details on impact and remediation steps.
(Please contact hello@insightgig.com to report potential misuse or security vulnerabilities.)
Want to go deeper?
Find quick answers to your questions in our FAQs page.
To understand our guiding principles, read Privacy, Governance & Guardrails.
Or access our full security and compliance documentation below.
Evaluating InsightGig for your team?
If security, privacy, or AI governance is part of your decision process, we’re happy to walk you through how InsightGig fits your requirements.
- Talk to us about security and compliance
- Request enterprise documentation like DPA or NDA
Email hello@insightgig.com to start the conversation.
