Book a Demo
Documentation · For Risk & Compliance teams

Appice Risk Team Guide.

Where the data sits, which regulators it answers to, and how PII never enters the decisioning core. The reference for Risk, Compliance, Privacy and Internal Audit teams reviewing Appice.

Data residency Compliance Data hashing
01 · Data residency

Your data stays where the regulator says it stays.

Appice supports in-country and in-region deployment as a first-class architectural choice — not as a configuration override. Wherever your supervisor requires data to live, Appice can run there, with no cross-border data flow unless you explicitly enable it.

In-country deployment

Deploy in the customer's own data centre, in-country private cloud, in-region public cloud (AWS / Azure / GCP / OCI region), or sovereign cloud. PII, decision logs, models and audit trails remain in-country.

No outbound data egress

Customer data does not leave the deployment boundary. Telemetry, support diagnostics and product metrics are scoped to non-PII operational data and can be disabled or routed to a customer-controlled endpoint.

Tenant & environment isolation

Single-tenant deployments by default for regulated customers. Production, UAT and DR environments segregated by network, identity and key material — separate KMS scopes, separate audit streams.

Data lifecycle & retention

Configurable retention windows by data class, automated purges, lawful hold support, and verifiable deletion — including model artefacts, decision logs and backups.

02 · Compliance

Compliance is the architecture, not a checkbox.

Banking, telco, healthcare, insurance and government supervisors don't ask whether your AI is "smart". They ask where the data lives, who can see PII, whether the decision is explainable, and whether you can produce an audit log on demand. Appice was engineered for that question first.

Financial services

RBI · SAMA · MAS

Aligned with RBI (India) data localisation, SAMA (KSA) cybersecurity and outsourcing rules, MAS (Singapore) TRMG and outsourcing notices. Production deployments in regulated banks across these jurisdictions.

Privacy

GDPR · DPDP · PDPA · CCPA

Lawful basis, purpose limitation, consent capture, data subject access requests, right-to-be-forgotten, automated decision-making disclosures — handled at platform level, not bolted on per use case.

Healthcare

HIPAA-aligned

PHI handling controls, access logging, BAA-supported deployment patterns, and de-identification primitives that line up with HIPAA Privacy and Security Rule expectations.

Audit & explainability

Every decision is defensible

Immutable decision logs capture input features, model version, output, suppression reasons, consent state and operator identity. Each can be replayed and explained — for the regulator, internal audit or model risk management.

Consent & suppression

Consent-first by design

Channel-level and purpose-level consent, do-not-disturb, regulatory suppression lists (e.g. NDNC), quiet-hours and frequency caps enforced inside the decisioning core — before any action fires.

Certifications & assurance

Independently assessed

SOC 2 Type II, ISO 27001 and ISO 27701 controls; annual third-party penetration testing; customer-led VAPT and architecture reviews supported as part of onboarding.

03 · Data hashing

PII never enters the decisioning core.

Most platforms move PII around freely and protect it at the edges. Appice does the opposite: PII is hashed into opaque, irreversible tokens at the boundary, and only those tokens flow through models, journeys, decision logs and reports.

The result: a regulated decision engine that can do its job — at scale, in real time — without your customer's name, account number, MSISDN, MRN or email ever sitting inside it.

Tokenisation at the edge

Inbound identifiers are hashed at ingestion using customer-controlled keys (HMAC-SHA-256 or stronger). Plaintext PII is dropped at the boundary; only the resulting opaque token flows downstream.

Irreversible by design

Hashes are cryptographically irreversible and salted per tenant. Even with full access to the decisioning core, an operator cannot recover the original PII — re-identification requires the customer-held key.

Customer-managed keys

Hashing salts and tokenisation keys live in your KMS / HSM — AWS KMS, Azure Key Vault, GCP KMS, HashiCorp Vault, or on-prem HSMs. Appice holds no copy.

Re-identification at the channel boundary

When an action needs to fire (an SMS, a push, an email), the channel adapter resolves the token back to the contactable identifier inside the customer's environment — never inside the decisioning core, never logged in plaintext.

Logs & analytics, PII-free

Decision logs, debug traces and analytics dashboards reference tokens, not PII. Exports to your SIEM, data lake or BI tool inherit the same property — by construction, not by policy.

Ready for a Risk & Compliance review?

Bring your DPIA template, your supervisor's outsourcing notice and your hardest data-flow diagram. We'll walk through Appice on your terms.

Book a Demo IT Guide →