The documents your legal,
security, and procurement teams will ask for.
Public PDFs download directly. Sensitive materials (DPA, sample board deck, IR plan, CSAM SOP) deliver inside 24 hours after a one-form request. Every request also captures intent so we can tailor the follow-up — no marketing automation, no email cadences.
How the math actually works.
Methodology v1 (PDF)
public PDFFull published methodology — five indices, formulas, source weighting, confidence-interval treatment, peer-cohort anonymization, change log. Same content as the live /methodology page in attachable form.
Public · direct download. What your legal team asks for first.
Information Security Whitepaper v1 (PDF)
public PDFHow we handle data end-to-end: collection isolation, ingest hashing, salt-rotation schedule, storage encryption, access controls, audit logging, incident response chain. Pre-SOC 2 reference.
Subprocessor List v1 (PDF)
public PDFEvery third party that touches tenant data: licensed source partners, infrastructure providers, observability stack. Roles, regions, contractual posture. Updated quarterly with 14-day tenant notice on any change.
Data Retention & Deletion Policy v1 (PDF)
public PDFRetention windows by data category, deletion-request handling (GDPR Art. 17 + CCPA equivalents), off-ramp export, hash-rotation timing. Includes the contractual deletion endpoint specification.
Gated · 24h delivery. Direct identifiable artifacts.
DPA Template v1 (DRAFT)
gatedMaster DPA template covering processor / sub-processor obligations, SCCs, breach notification windows, audit rights. Reviewed by external counsel; final version locks at first design-partner signature.
Sample Anonymized Board Deck
gatedWhat the quarterly board PDF actually looks like — 16 pages, anonymized peer cohort, cover, executive summary, metric trends, top findings, USD exposure quantification, peer benchmark, recommendations, methodology pointer.
Incident Response Plan v1
gatedP0–P2 severity definitions, response SLAs per tier, escalation chain, evidence-chain preservation, post-incident audit and tenant notification protocol.
Content Safety & CSAM Reporting SOP v1
gatedAutomated detection thresholds, immediate-purge on match, NCMEC reporting integration, jurisdictional preservation duties, internal-incident handling. Hard rule across every Exposure Bureau contract.
Send one form, get everything you need.
Tick the materials you want. Gated items arrive inside 24h after a short internal review. Public PDFs are also delivered as a record of the request — useful for legal-review paper trails.
Two emails: confirmation + the materials.
We don't resell your address. We don't add you to a nurture sequence. You get the documents you asked for, and a follow-up only if you specifically asked for a conversation.
Useful in a procurement paper trail.
Every request is timestamped and tied to the methodology version available at request time. Tenants can request a request log for their own procurement audit if needed.