security
Secure, scalable & compliant
Designed to meet the security and compliance needs of regulated screening workflows.
TLS 1.2+ enforced for all connections
Encrypted data handling with configurable retention
Designed for AML/CFT, and KYC screening use cases
Data Handling & Privacy
Secure, Minimal, and Purpose-Limited Data Processing
PII Minimization
Only data required for screening is processed No enrichment or secondary useEncryption at Rest
All stored data encrypted at rest Encryption applies to databases, backups, and logsData Retention
Configurable retention per customer Default retention: 30–90 days Immediate deletion available on requestPurpose Limitation
Customer data is processed solely for name screening purposes and not used for secondary processing or model training.Compliance & Regulatory Alignment
Aligned with Global AML, KYC, and Data Protection Expectations
Screening Purpose
AML / CFT KYC & KYB Sanctions, PEPs, adverse media supportUAE Data Considerations
Designed to support UAE regulatory expectations Data residency and transfer evaluated per customer requirementsGDPR Alignment
Lawful purpose limitation Data minimization Data subject rights support Processor role clarityIncident Response
Defined incident response process Customer notification proceduresAccess Controls
security.security_department23.description
API Authentication
API key–based authentication Key rotation supportedEnvironment Separation
Separate API keys and credentials per environment (sandbox vs production) to prevent accidental access or data leakage across environments.Authorization
Scoped API keys (read/write, environment-specific) IP allow-listing (Business tier)Credential Hygiene & Monitoring
Secure storage of API keys, usage monitoring, and anomaly detection to identify unusual access patterns or potential key compromise.Get Started With Siraj