Resources · methodology · compliance · samples

The documents your legal,
security, and procurement teams will ask for.

Public PDFs download directly. Sensitive materials (DPA, sample board deck, IR plan, CSAM SOP) deliver inside 24 hours after a one-form request. Every request also captures intent so we can tailor the follow-up — no marketing automation, no email cadences.

01·Methodology

How the math actually works.

Methodology v1 (PDF)

public PDF

Full published methodology — five indices, formulas, source weighting, confidence-interval treatment, peer-cohort anonymization, change log. Same content as the live /methodology page in attachable form.

32 pages·for CTO · legal · risk
02·Compliance posture

Public · direct download. What your legal team asks for first.

Information Security Whitepaper v1 (PDF)

public PDF

How we handle data end-to-end: collection isolation, ingest hashing, salt-rotation schedule, storage encryption, access controls, audit logging, incident response chain. Pre-SOC 2 reference.

24 pages·for CTO · CISO · security ops

Subprocessor List v1 (PDF)

public PDF

Every third party that touches tenant data: licensed source partners, infrastructure providers, observability stack. Roles, regions, contractual posture. Updated quarterly with 14-day tenant notice on any change.

8 pages·for legal · compliance

Data Retention & Deletion Policy v1 (PDF)

public PDF

Retention windows by data category, deletion-request handling (GDPR Art. 17 + CCPA equivalents), off-ramp export, hash-rotation timing. Includes the contractual deletion endpoint specification.

11 pages·for legal · compliance · privacy
03·Templates & samples

Gated · 24h delivery. Direct identifiable artifacts.

DPA Template v1 (DRAFT)

gated

Master DPA template covering processor / sub-processor obligations, SCCs, breach notification windows, audit rights. Reviewed by external counsel; final version locks at first design-partner signature.

18 pages·for legal

Sample Anonymized Board Deck

gated

What the quarterly board PDF actually looks like — 16 pages, anonymized peer cohort, cover, executive summary, metric trends, top findings, USD exposure quantification, peer benchmark, recommendations, methodology pointer.

16 pages·for CFO · board · risk

Incident Response Plan v1

gated

P0–P2 severity definitions, response SLAs per tier, escalation chain, evidence-chain preservation, post-incident audit and tenant notification protocol.

14 pages·for CTO · security · legal

Content Safety & CSAM Reporting SOP v1

gated

Automated detection thresholds, immediate-purge on match, NCMEC reporting integration, jurisdictional preservation duties, internal-incident handling. Hard rule across every Exposure Bureau contract.

9 pages·for legal · compliance · ops
Request multiple

Send one form, get everything you need.

Tick the materials you want. Gated items arrive inside 24h after a short internal review. Public PDFs are also delivered as a record of the request — useful for legal-review paper trails.

Request materials
What you need
We respond inside 24h · no marketing automation
No marketing email cadence

Two emails: confirmation + the materials.

We don't resell your address. We don't add you to a nurture sequence. You get the documents you asked for, and a follow-up only if you specifically asked for a conversation.

Tracked for audit

Useful in a procurement paper trail.

Every request is timestamped and tied to the methodology version available at request time. Tenants can request a request log for their own procurement audit if needed.