Security

Security at AXYZ Analytics

A standard overview of our approach to confidentiality, data handling, and client security requests.

This page provides general information only. More detailed answers can be shared once project requirements and internal policies are clarified.

Governance and confidentiality

  • Client information is handled as confidential project material.
  • Access can be limited to relevant team members on a need-to-know basis.
  • Standard NDA and procurement requests can be reviewed during onboarding.

Data minimization

  • We aim to work with the minimum data needed for the project.
  • Aggregated, anonymized, or pseudonymized inputs are preferred when appropriate.
  • Data-sharing scope can be aligned before work begins.

Collaboration and access

  • Collaboration methods can be aligned with client requirements where needed.
  • Project access can be reviewed as teams and scopes evolve.
  • Questions on tools, file sharing, or workflows can be discussed during setup.

Retention and deletion

  • Retention expectations can be discussed at the start of the engagement.
  • Return or deletion requests can be addressed at project close when required.
  • More detailed arrangements can be confirmed case by case.

Common questions

Do you support NDAs and security questionnaires?

Yes. We can review standard NDA, procurement, and due-diligence requests.

Can projects be scoped to limit sensitive data?

Yes. When possible, we encourage limiting shared data to what is needed for the work.

Can retention and deletion be agreed in advance?

Yes. These points can be discussed during contracting or onboarding.

How can we request more detail?

Use the contact page and mention security, procurement, or data-handling questions.

Need more detailed information?

We can discuss standard security and data-handling questions during onboarding.