Confidentiality by Default
All client data, workflows, and business logic are treated as confidential. We sign NDAs before any data exchange and maintain strict information barriers between clients.
Spacetime Studios treats every client engagement as confidential by default. We follow least-privilege access controls, encrypt data in transit and at rest, and never use client data to train models. This page outlines our security practices, data handling policies, and compliance posture for enterprise procurement review.
Last reviewed: February 2026
All client data, workflows, and business logic are treated as confidential. We sign NDAs before any data exchange and maintain strict information barriers between clients.
We never use client data to train, fine-tune, or improve AI models beyond the scope of the specific engagement. Your data stays your data.
All data transmitted between systems uses TLS 1.2+. Data stored during development and deployment uses AES-256 encryption at rest.
Team members only access the systems and data required for their specific tasks. Access is provisioned per-project and revoked upon completion.
When we integrate AI models (OpenAI, Anthropic, etc.) into client systems, we use enterprise API tiers that include data processing agreements (DPAs) and zero-retention policies where available.
AI agents are deployed with configurable approval gates. High-stakes actions (financial transactions, customer communications, data deletion) require human review before execution.
New automations are deployed incrementally, starting with a subset of workflows, monitoring for errors, then scaling to full production after validation.
Every AI action is logged with timestamps, input data, model responses, and outcome. Logs are retained per client requirements and available for compliance review.
Post-deployment, we conduct regular reviews of AI agent performance, accuracy, and error rates. Systems are tuned and updated based on real-world feedback.
Yes. We sign mutual NDAs before any data exchange or detailed scoping begins. We can use your standard NDA or provide ours.
Yes. We adapt to your organization's security policies, compliance requirements, and vendor onboarding process. We've worked with organizations that require SOC 2-aligned controls, BAAs for healthcare data, and custom data handling agreements.
Yes. We carry professional liability (E&O) and general liability insurance. Certificates of insurance are available upon request.
All client data in our development environments is deleted within 30 days of engagement completion. Source code and documentation are transferred to your team. We retain no copies of client data after the engagement.
Yes. We deploy to client-owned infrastructure (AWS, GCP, Azure, on-premise) or client-approved environments. We don't require you to use any specific hosting provider.
We're happy to walk through our security practices in detail, provide documentation for your procurement team, or complete your vendor security questionnaire.
BOOK A STRATEGY CALL →