Trust & Security

Your data stays yours. Period.

Projectory AI is built on a foundation of security, privacy, and transparency. Your proprietary content is never used to train AI models — and never will be.

Zero Retraining

Your proposals, past performance, and uploads are never used to train or fine-tune AI models. Ever.

Data Isolation

Every customer's data is processed in fully isolated, single-tenant environments. No cross-customer access.

Encryption Everywhere

AES-256 encryption at rest and TLS 1.2+ in transit. Your data is protected at every layer.

You Own Everything

100% intellectual property retention. Export or delete your data anytime. No vendor lock-in.

Data Privacy

We will never train on your data

Unlike many AI tools, Projectory does not use your content to improve, train, or fine-tune any AI models. Your proposals, past performance narratives, uploaded solicitations, and organizational knowledge stay completely private.

Your documents are never fed into model training pipelines
We do not aggregate or anonymize customer data for AI improvement
Our AI models are developed using licensed, public datasets only
No third-party AI provider receives your content for training purposes
This commitment is contractual — not just a policy, it's a guarantee

The Projectory Promise

What we will never do

Use your proposals to train AI models
Share your data with other customers
Allow third parties to access your content
Mine your documents for competitive insights
Retain your data after you request deletion
Security

Enterprise-grade security architecture

Built for organizations that handle sensitive government proposals and regulated content. Every layer of our stack is designed with security as a first principle.

AES-256 Encryption at Rest

All stored data — documents, proposals, and organizational content — is encrypted using AES-256, the same standard used by the U.S. government for classified information.

TLS 1.2+ In Transit

Every data transmission between your browser and our servers is encrypted with TLS 1.2 or higher, preventing interception or tampering.

Role-Based Access Controls

Granular permissions ensure only authorized team members can view, edit, or manage proposal content. Admins control who sees what.

Full Audit Trail

Every action is logged — who accessed what, when, and what changes were made. Complete traceability for compliance and governance.

Tenant-Level Isolation

Your data lives in its own isolated environment. It is never commingled with other customers' data, even at the infrastructure level.

Regular Security Assessments

We conduct routine penetration testing, vulnerability assessments, and security audits to stay ahead of emerging threats.

How our citation-first approach works

Every AI output is verifiable against source documents

01

AI reads your solicitation

Documents are analyzed in your isolated environment

02

Requirements are extracted with citations

Every requirement links to its exact source location

03

Compliance matrix maps to sections

Traceable mapping from source to proposal structure

04

You verify and approve

Click any output to see the original text — nothing is fabricated

Transparency

Transparent AI you can verify

We believe AI should earn your trust through transparency, not ask for it through promises. Every output Projectory generates is traceable to its source, so you can verify exactly what the AI did and why.

Every extraction links back to the source document and page
Click any AI output to see the original solicitation text
Human review required before any content enters your proposal
Complete audit trail for compliance teams and evaluators
Compliance

Built for regulated environments

Whether you handle CUI, work under DFARS, or operate in air-gapped environments, Projectory is designed to meet the compliance standards your organization requires.

SOC 2 Type II

Our infrastructure and processes are designed to meet SOC 2 Type II requirements for security, availability, and confidentiality.

U.S. Government Cloud

Enterprise customers can deploy on U.S. Government Cloud infrastructure with FedRAMP-aligned controls for federal workloads.

NIST 800-171 Alignment

Our security controls align with NIST 800-171 standards for protecting Controlled Unclassified Information (CUI).

On-Premise Deployment

For organizations with the strictest requirements, we support on-premise and air-gapped deployment options.

Human Oversight

AI assists. Humans decide.

Projectory is designed with human-in-the-loop principles at its core. AI accelerates your workflow, but every decision — what to include, how to phrase it, when to submit — stays with your team.

All AI-generated content requires human review before inclusion
Writers have full editorial control over every section
AI suggestions are clearly labeled and can be accepted, modified, or rejected
Final submissions are always initiated by authorized human users
No automated actions are taken without explicit user approval

Built with real-world expertise

Our AI was shaped by professionals who have lived the proposal process

GovCon SMEs

Decades of proposal writing and management experience

Former Evaluators

Government professionals who scored proposals

Compliance Specialists

FAR, DFARS, and grant regulation expertise

Security Engineers

Government-grade infrastructure experience

FAQ

Common questions about trust & security

Straight answers to the questions your security and compliance teams are asking.

Ready to work with AI you can trust?

Start your free trial and see how Projectory combines speed with security. Your data stays private. Your proposals stay yours.

Have security questions? Read our AI Policy or email security@projectory.ai