Security & Compliance

How we protect your research data

1. Data Protection

Prairie Genomics is built with defense-in-depth security from the ground up. Every layer of the platform is designed to keep your research data safe.

  • Encryption in transit (TLS 1.3) and at rest (AES-256)
  • Isolated per-user workspaces — no cross-tenant data access
  • Authentication via Clerk with industry-standard JWT tokens
  • Role-based access controls on all API endpoints

2. Your Data, Your Rules

You maintain complete ownership of everything you upload and everything the platform generates from your data.

  • You retain full ownership of all uploaded data and generated results
  • Your data is never used to train machine learning models
  • Data is deletable at any time upon request
  • We never share your data with third parties

3. Analysis Infrastructure

Every analysis runs in a fully isolated environment that is created on demand and destroyed when complete — ensuring no data leaks between sessions or users.

  • Every analysis runs in an isolated, ephemeral container
  • Containers are created on demand and destroyed after completion
  • No persistent state between analyses — clean environment every time
  • S3-compatible object storage with per-user access controls

4. Compliance Roadmap

We are actively pursuing industry certifications to meet the needs of regulated research environments.

SOC 2 Type II

Organization-wide security controls audit

In Progress
HIPAA

Architecture designed with HIPAA requirements in mind

Planned
21 CFR Part 11

For GxP-regulated workflows

Under Evaluation

5. Questions?

For security inquiries or compliance documentation requests, visit our Contact page or email security@prairiebiosciences.com