SECURITY & PRIVACY
Bank-grade security, by default.
Data stays inside. Private LLM for financial data. Certified to banking standards.
CERTIFIED, ENCRYPTED, AUDITED
Built to bank-grade.
Architected for Indian regulatory requirements. Encryption everywhere. Compliance evidence on demand.
Enterprise-grade infrastructure with zero-trust access controls.
End-to-end AES-256 encryption in transit and at rest.
Audited information-security management system.
Trusted by banks, NBFCs and large enterprises.
THE FOUR PILLARS
How AICA keeps your data safe.
Four guarantees that show up in every contract we sign with a bank, NBFC or enterprise.
Private LLM per tenant. Files never reach public models. No cross-customer mixing. In-region hosting.
TLS 1.3 in transit, AES-256 at rest. Customer-managed keys available. Field-level encryption for PII.
SSO, MFA & recorded reason per read. Role & row-level permissions. Auditors see all but can't write.
Logs every API call, invocation & alert. Audit packs on demand in RBI format. Sourced conclusions.
CERTIFICATIONS & FRAMEWORKS
Compliance evidence on demand.
Aligns with Indian regulatory & enterprise risk frameworks. Share security pack with CISO in one click.
CERTIFIED
Information-security management system audited annually by an accredited certification body.
ALIGNED
RBI Digital Lending Guidelines compliant from day one.
NATIVE
Consent-based data fetch via Setu and Finvu. Every data pull is consent-recorded and revocable.
REGULATED
DPDPA compliant. Purpose limitation, minimization, breach notification, deletion on request.
PRIVATE ISOLATED LLM
Your borrowers' files never touch a public model.
Private LLM per tenant: dedicated inference, storage & keys. No cross-customer training.
-
Dedicated inference per tenant
Prompts & files processed on tenant-scoped instance only.
-
No training on customer data
Customer data never trains or fine-tunes models. Improvements from synthetic & public data.
-
In-region hosting
Indian deployments hosted in Mumbai region. No data crosses borders unless explicitly contracted otherwise.
WANT THE FULL SECURITY PACK?
Talk to our security team.
Architecture diagrams, data-flow specs, audit reports, certification documents, share with your CISO or risk team in one call.
A Recur Club product