Compliance

Enterprise-grade security. Zero PII in logs. Employee-blind architecture. SOC 2 path.

๐Ÿ”’ Privacy Policy

How FOXTANA collects, uses, and protects your data. Employee-blind architecture means not even JOSFOX employees can access your data unencrypted.

Read Privacy Policy โ†’

๐Ÿ“‹ Terms of Service

Rules of engagement for using FOXTANA AI services. Pay-as-you-go billing, SLA commitments, and usage guidelines.

Read Terms of Service โ†’

โš–๏ธ Legal & Corporate

JOSFOX LLC corporate information, jurisdiction, intellectual property notices, and regulatory compliance.

Read Legal Notice โ†’

๐Ÿ›ก๏ธ Security Posture

Our security architecture: deny-by-default access control, encryption at rest and in transit, immutable audit logs, and break-glass emergency protocols.

  • Zero PII in application logs โ€” ever
  • Encryption at rest (AES-256) + in transit (TLS 1.3)
  • Employee-blind architecture โ€” data encrypted with tenant keys
  • Break-glass protocol requires dual approval + audit trail
  • SOC 2 Type II โ€” on roadmap (Security + Availability + Confidentiality)
  • Logical tenant isolation (all plans) + Physical isolation (Enterprise)
๐Ÿ” TLS 1.3
๐Ÿ›ก๏ธ AES-256
๐Ÿšซ Zero PII in Logs
๐Ÿ‘๏ธโ€๐Ÿ—จ๏ธ Employee-Blind
๐Ÿ“‹ SOC 2 Path
๐Ÿ”’ Deny-by-Default