Are you SOC 2 certified?
Not yet — SOC 2 Type II attestation is on our 2027 trajectory once retainer revenue justifies the audit cost. What's in place today: SOC 2-aligned controls (access governance, change management, encryption at rest and in transit, incident response runbooks, vendor risk reviews). For clients in regulated industries, we map our existing controls to the Trust Service Criteria categories so your auditor has a clear picture even without our own attestation.
Can you build HIPAA-compliant systems?
We build HIPAA-ready architecture — meaning the technical safeguards (encryption, access controls, audit logging, secure transmission) are in place from day one. HIPAA compliance is a property of the operating organization plus its Business Associate Agreements, not the software vendor in isolation. We sign BAAs for engagements where we touch PHI, and we work with cloud providers (AWS, Vercel) under their HIPAA programs when the workload requires it.
What's your AI safety posture?
Three layered defaults. (1) Human-in-the-loop on every destructive or irreversible action — agents draft and propose; humans approve before anything material moves. (2) Eval harnesses on every prompt-driven workflow before it goes to production, with regression suites that run on every change. (3) Prompt-injection scanning on inbound user content before it reaches an LLM, plus output validation against expected shape before any downstream action fires. The goal isn't AI that never errs — it's AI where errors are caught at the gate, not in production.
How do you handle data retention and deletion?
Retention schedules are defined per data class at engagement kick-off — operational data for as long as the workflow requires it, telemetry capped at 90 days by default, audit logs retained for regulatory minimums (typically 7 years for financial / inspection work). Right-to-deletion workflows are built into systems that handle consumer data. We document the retention matrix in the engagement; nothing is retained by default "because we might want it."
How does your change-management process actually work?
Every change flows through the pipeline you see on this page: PR with required reviewer + automated checks → CI (type, lint, unit, e2e) → staging deploy with smoke tests → canary at 5% of production traffic → promote to 100%. Every gate is audit-logged. No direct production writes — even hotfixes flow through the same path with an expedited canary window. Rollback is a one-command operation that completes in under 90 seconds for the marketing site, under 5 minutes for the larger platforms.
What's your incident response process?
Sev-1 (production down) pages the on-call engineer within 5 minutes via the monitoring stack. Acknowledgment SLA is 15 minutes. Status page updates every 30 minutes until resolved. Post-mortem within 5 business days, published internally and shared with the affected client. We optimize for blameless post-mortems and root-cause durability — the same incident class shouldn't recur because the fix was a script, not a system change.
How do you protect customer data from your own team?
Least-privilege RBAC on every system; principal engineer access is provisioned per engagement, not per employee. Production data access is logged and reviewed quarterly. Engineers see synthetic / scrubbed data in staging by default. Secrets are managed via the cloud provider's secret store with rotation policies; nothing sensitive lives in source. When an engineer leaves the firm, access is revoked the same day.
Can you provide an audit trail of what your AI did?
Yes — every AI-mediated action is recorded with the input prompt, the model version, the response, any tool calls made, and the human approver (when HITL applies). Audit logs are immutable, retained per the data-class schedule, and queryable. For regulated workflows (inspection reports under AMPP, intake decisions in legal) the audit trail is part of the system's value proposition, not a logging addendum.