Veridex proves who authorized the action. CPE proves what happened to the data while the AI platform had it.
Four-Event Custody Chain
① Dispatch
Data leaves the originating system. Classification, privacy profile, and payload hash are recorded.
② Transit
Encryption and persistence state while in transit. AES-256-GCM with profile-appropriate key management.
③ Collection
AI platform response received. Actual processing interval measured against the maximum allowed.
④ Purge
Data destroyed from AI platform environment. Purge method and verification status recorded.
Four Privacy Profiles
Profile 1 (Ephemeral): in-memory only, zero persistence, immediate overwrite. Profile 2 (Transient): encrypted cache, auto-purge ≤ 60s. Profile 3 (Session): encrypted at rest, session-end purge. Profile 4 (Retained): encrypted, policy-governed retention. Each profile carries enforced constraints on encryption, persistence, and purge method.