Security is fundamental to everything we build at Nomic. This page outlines our approach to protecting your data, maintaining privacy, and ensuring secure AI interactions.
For security-related questions or to report vulnerabilities: security@nomic.ai
Nomic is committed to maintaining the highest security standards and undergoes regular third-party assessments to validate our security posture.
SOC 2 Type II Certified: Nomic is SOC 2 Type II certified. Visit our Security Center to request a copy of our compliance report and other security documentation.
Penetration Testing: We commit to conducting at least annual penetration testing by reputable third parties. External penetration test reports and other security assessments are available through our Security Center.
Vendor Reviews: All security documentation, compliance reports, and vendor assessment materials can be accessed at security.nomic.ai. You will be asked to sign an NDA before being granted access.
Our infrastructure is built with security-first principles, utilizing industry-leading cloud providers and following best practices for data protection.
We depend on the following subprocessors to deliver our services. Data handling varies by service - see our full trust center for complete details.
Geographic note: None of our infrastructure is located in China, and we do not directly use any Chinese companies as subprocessors.
When you use Nomic’s AI features, we take great care to protect your data throughout the AI processing pipeline.
AI requests may include context from your files, conversation history, and relevant file snippets. This data is sent to our infrastructure and then to appropriate AI model providers (OpenAI, Anthropic, etc.) under strict data protection agreements.
All files stored with Nomic are indexed using Nomic Platform infrastructure. When your data isn’t being processed, it is stored only in your Nomic instance and is encrypted at rest.
Indexing works by sending files or folders of files to the Nomic Platform embedding and parsing APIs which use our custom models for visual document processing and understanding.
Nomic offers flexible deployment options to meet different security and compliance requirements. Each option provides different levels of data control and processing locations.
Our standard cloud offering where Nomic manages all infrastructure and operations.
Deploy Nomic within your own cloud environment while leveraging our platform services.
Fully isolated deployment within your own infrastructure with custom agreements.
For enterprise customers requiring specific compliance, data residency, or security controls, we offer custom deployment options. Contact our team at sales@nomic.ai to discuss your requirements.
You have full control over your data and can delete your account and associated data at any time.
Note: If your data was used in model training (opt-in), existing trained models will not be immediately retrained, but future model training will not include your deleted data.
We take security vulnerabilities seriously and encourage responsible disclosure from the security community.
If you discover a security vulnerability, please report it to: security@nomic.ai