Data Legitimacy

🔗 Data Legitimacy — CPE Proof

What happened to the data from dispatch through purge?

Veridex proves who authorized the action. CPE proves what happened to the data while the AI platform had it.

Four-Event Custody Chain

① Dispatch

Data leaves the originating system. Classification, privacy profile, and payload hash are recorded.

② Transit

Encryption and persistence state while in transit. AES-256-GCM with profile-appropriate key management.

③ Collection

AI platform response received. Actual processing interval measured against the maximum allowed.

④ Purge

Data destroyed from AI platform environment. Purge method and verification status recorded.

Four Privacy Profiles

Profile 1 (Ephemeral): in-memory only, zero persistence, immediate overwrite. Profile 2 (Transient): encrypted cache, auto-purge ≤ 60s. Profile 3 (Session): encrypted at rest, session-end purge. Profile 4 (Retained): encrypted, policy-governed retention. Each profile carries enforced constraints on encryption, persistence, and purge method.

← Back to Stack See Demo →