Data Policy

Dystr is built from the ground up as an enterprise-grade platform, with security and data privacy as core design principles. This document outlines our commitments to protecting your intellectual property and sensitive data.

Data Ownership and Control

We maintain a clear stance on data ownership:

  • Your organization retains all rights and ownership of data processed through Dystr.
  • This includes all derived works and model outputs generated within your Workspaces.
  • No rights are transferred to Dystr or our technology providers.

Data Usage Boundaries

To protect your intellectual property:

  • Your data is used solely to process your specific requests.
  • Data is never used to train or improve models that serve other customers.
  • There is no cross-contamination between customer environments.

Data Security Implementation

Our security architecture implements industry-standard protections:

  • TLS 1.2+ encryption for all data in transit.
  • AES-256 encryption for all data at rest.
  • Encryption is enforced at all times, with no exceptions.

Private VPC Deployment Option

For organizations with stringent security requirements:

  • Fully isolated Virtual Private Cloud (VPC) deployment.
  • Complete network separation from other customers.
  • Ability to implement your organization's security controls.
  • Support for your existing security and compliance frameworks.

This offering is particularly suitable for organizations in regulated industries or those handling sensitive intellectual property. Contact our enterprise team to discuss deployment options and join the waitlist.

Summary

Your data and intellectual property are treated with the highest level of security and confidentiality. We implement strong technical controls, maintain clear boundaries, and provide deployment options that meet enterprise security requirements. We welcome detailed technical discussions with your security team to address specific concerns or requirements.