ORCA runs inside your cloud tenant — or ours, if you pick the hosted tier. Either way: no data shared, zero retention after matter close, never used for model training.
A short trust statement up front, because everything else on this page is detail under it.
PlumGen ships ORCA as software you deploy into your cloud. The software runs on your infrastructure, against your data. We are not a data processor in the self-host model.
If you pick Solo or Org, we host on your behalf in a tenant you can audit. Your matter is logically isolated; no shared storage, no shared compute. Region of your choice.
Customer corpus, custodian data, work product — never used to train models, fine-tune embeddings, or improve PlumGen products. Written commitment, not just an FAQ entry.
Inbound through a WAF and TLS. Egress through a deny-all firewall with an explicit allowlist. Internal services reachable only via private endpoints.
| Layer | What | How |
|---|---|---|
| At rest — storage | Document objects, exports, backups | AES-256, platform-managed key by default; customer-managed keys (CMK) on request |
| At rest — database | Relational store | Transparent data encryption + CMK option |
| At rest — search index | Vector index, BM25 shards | AES-256 with KMS-rotated keys |
| In transit — external | Customer ↔ ORCA | TLS 1.2+ (1.3 preferred), HSTS, strict cipher suites |
| In transit — internal | Service ↔ service | mTLS via service mesh |
| Key custody | Master keys | Customer-managed KMS; PlumGen never exports your keys |
Chain-of-custody from source. SHA-256 hash per document on receipt; manifest cryptographically signed. Pipeline runs in-VPC; no third-party processing.
Accessible only to authorized reviewers per IAM. Privileged documents flagged; clawback-ready under FRE 502(d). All access logged.
Configurable retention per matter — default 30 days post-close for export verification, then cryptographic deletion. Keys destroyed.
Self-host: wherever you provisioned. Hosted: your selected region; no cross-region replication without explicit consent. BAA / DPA / SCC available.
All compliance frameworks below are on the active roadmap. The underlying architectural and audit controls (encryption, IAM, logging, vendor reviews, written policies) are in place today and continuously monitored.
| Framework | Status | Notes |
|---|---|---|
| SOC 2 Type II | Roadmap · Q3 2026 | In audit. Continuous-monitoring controls live; full control inventory available under NDA. |
| HIPAA | Roadmap | BAA in preparation. Encryption + audit controls aligned with HIPAA Security Rule. |
| GDPR / UK GDPR | Roadmap | DPA + SCC clauses in preparation. Privacy by design; DSAR workflow on the build plan. |
| CCPA / CPRA | Roadmap | "Do not sell" non-applicable — we never sell or share customer data. |
| ISO 27001 | Roadmap | Gap assessment scheduled after SOC 2 close. |
| FedRAMP | Roadmap | Self-host air-gap mode supports many of the controls; full ATO is a multi-year program. |
Policies available under NDA as part of the security packet.
Architecture diagrams, control inventory, policy stack, sample audit logs, SOC 2 readiness letter, and BAA / DPA templates. Available under mutual NDA.
Request the security packet Talk to security