Security & Compliance
How we protect your research data
1. Data Protection
Prairie Genomics is built with defense-in-depth security from the ground up. Every layer of the platform is designed to keep your research data safe.
- Encryption in transit (TLS 1.3) and at rest (AES-256)
- Isolated per-user workspaces — no cross-tenant data access
- Authentication via Clerk with industry-standard JWT tokens
- Role-based access controls on all API endpoints
2. Your Data, Your Rules
You maintain complete ownership of everything you upload and everything the platform generates from your data.
- You retain full ownership of all uploaded data and generated results
- Your data is never used to train machine learning models
- Data is deletable at any time upon request
- We never share your data with third parties
3. Analysis Infrastructure
Every analysis runs in a fully isolated environment that is created on demand and destroyed when complete — ensuring no data leaks between sessions or users.
- Every analysis runs in an isolated, ephemeral container
- Containers are created on demand and destroyed after completion
- No persistent state between analyses — clean environment every time
- S3-compatible object storage with per-user access controls
4. Compliance Roadmap
We are actively pursuing industry certifications to meet the needs of regulated research environments.
Organization-wide security controls audit
Architecture designed with HIPAA requirements in mind
For GxP-regulated workflows
5. Questions?
For security inquiries or compliance documentation requests, visit our Contact page or email security@prairiebiosciences.com