Orcana Data Privacy & Security
Last Updated: September 30, 2025
Effective Date: August 14, 2024
We design every system, model, and
workflow to ensure that no raw customer data ever leaves your environment unprotected. This document
outlines how Orcana’s architecture, encryption standards, and privacy controls uphold the highest
standards of enterprise data protection.
Guiding Principle: Zero Raw-Data Exposure
Orcana ensures that sensitive customer data is never directly processed, stored, or viewed by Large Language Models (LLMs) or any third-party service. Our product architecture separates data ingestion, processing, and interpretation layers to maintain total data isolation and integrity.
- No external API exposure — all model interactions happen through Orcana-managed APIs.
- LLMs never see raw data — all customer identifiers are encrypted or replaced with secure placeholders.
- No training on client data — neither Orcana nor Azure OpenAI uses your data for model fine-tuning.
- Traceable and explainable outputs — every analytic result is verifiable and auditable through Orcanalytics™.
System Architecture Overview [See Appendix for diagram]
Orcana’s architecture follows a multi-layered secure analytics pipeline designed for accuracy, privacy, and compliance.
Data Flow & Analysis
Data Ingestion — Data is pulled securely from client CRMs or data warehouses (e.g., Snowflake) through API integrations.
Data Staging — Incoming data is cleaned, normalized, and stored temporarily in a staging environment for pre-processing.
Analytics Execution — Orcana’s proprietary AI engine, Orcanalytics™, performs deterministic analysis on staged data — no data leaves the environment unencrypted.
Insight Generation — The natural language layer converts analytic output into readable insights while preserving full data anonymization.
LLM Integration & Secure AI Usage
3.1 Controlled Model Interaction
Orcana leverages Azure OpenAI for natural language generation but operates through independent,
Orcana-owned API gateways.
Each request to the LLM:
- Passes through Orcana’s encryption and validation layer.
- Uses encrypted entity placeholders (e.g., Product_ID_101 instead of “Drug A”).
- Returns structured text responses that are decrypted and validated internally.
3.2 Secure Azure Deployment
- All LLM calls are routed through Azure OpenAI deployments bound to Orcana’s tenant and region.
- Data isolation: Azure guarantees that prompts and completions are never stored or used for model retraining.
- Dedicated access control: Only Orcana systems can communicate with these deployments.
Deterministic Analytics with Orcanalytics™
Unlike generic AI wrappers, Orcana never uses LLMs to perform analytics. Our proprietary engine,
Orcanalytics™, executes all data retrieval, analysis, and visualization logic deterministically —
ensuring accuracy, repeatability, and compliance.
Key safeguards:
- No code generation on the fly — all analytics logic is written and maintained in-house.
- Industry- and domain-specific analytics modules ensure contextual accuracy.
- Ground-truth validation modules compare every LLM summary to the underlying analytic result to prevent hallucinations.
- All analytics pipelines are fully auditable and version-controlled.
Data Management and Processing
5.1 Data Minimization
Orcana integrates with client data warehouses using secure API connections and extracts only the fields necessary for analysis. This ensures:
- No unnecessary or redundant data transfer.
- Adherence to data minimization principles under GDPR and similar frameworks.
5.2 PII Redaction
Before any processing or model interaction:
- All Personally Identifiable Information (PII) is redacted using algorithmic redaction techniques.
- Optional “mapping IDs” allow clients to reconcile analytics with internal datasets while keeping Orcana’s systems anonymized.
Aggregation & Summarization
For analytics requiring trend or performance metrics, Orcana generates aggregated summaries instead
of storing identifiable records.
This ensures that no individual or entity can be traced from stored
data.
Data Storage and Encryption
Hosting:
Orcana is fully deployed on Microsoft Azure, utilizing its enterprise-grade data storage
infrastructure (Azure Blob, File, and SQL as applicable).
Encryption:
- AES-256 encryption at rest
- TLS 1.2+ encryption in transit
Access Control:
- Role-based access control (RBAC) and least-privilege policies.
- All service access requires secure authentication and audit logging.
Data Refresh:
- Stored data is refreshed on a defined cadence to maintain accuracy and compliance.
- No residual raw data persists beyond operational necessity.
Security Layer & Workflow Validation
Five-Step Secure Processing Workflow
Named Entity Encryption (Python): Sensitive identifiers (products, accounts, HCPs, reps) are encrypted.
Context Ingestion: Encrypted data and business rules are bundled securely.
LLM Response Generation: The LLM sees only anonymized placeholders.
Query → Result Validation: The generated response is validated against the analytical truth.
Decryption & Delivery: The encrypted entities are mapped back to real terms, and insights are presented securely.
Each output passes through relevance and consistency validation layers before being shared, guaranteeing accuracy and data safety.
Security Principles
Orcana’s systems are built around the CIA Triad — Confidentiality, Integrity, and Availability.
Confidentiality: No external access to customer data; encrypted throughout
lifecycle.
Integrity: All workflows and outputs are logged, validated, and tamper-proof.
Availability: Highly available Azure infrastructure with redundancy and disaster
recovery.
Additional safeguards include:
- Continuous vulnerability monitoring.
- SOC 2–aligned operational controls.
- Annual penetration testing by independent assessors.
- Role-based permissions enforced at every layer.
Customer Trust & Compliance
Orcana’s privacy and data management practices align with major global frameworks, including:
- GDPR (EU)
- CCPA (California)
- HIPAA readiness (for de-identified health data)
- SOC 2 Type II control alignment
All client data handling practices are transparent and can be reviewed under mutual NDA for compliance assurance.
Why Orcana Thrives on Security
- No raw data ever touches LLMs.
- All interactions occur within Orcana’s secure Azure environment.
- Outputs are deterministic, verifiable, and explainable.
- Every insight is traceable back to its analytic source.
- Customers maintain full ownership and visibility of their data at all times.
Contact Information
Orcana-AI, Inc. 1111B S Governors Ave STE 21776 Dover, DE, 19904 US 📧 info@orcana.ai
Appendix
System architecture diagram