Nomad Data is trusted by the world’s leading companies.

Nomad Data helps teams query, summarize, extract, and compare sensitive documents with speed & confidence. Security is built into how we design, operate, & support clients.

Trust Center
Trusted by

We Take Data Security Seriously

At Nomad Data, safeguarding sensitive information is foundational to how we build and operate. We support teams working in complex, regulated environments, especially insurance and financial services, where workflows often involve PII, PHI, and confidential business documents. That is why we implement strong administrative and technical safeguards, along with secure-by-design product practices, to help customers protect data and meet internal and regulatory requirements with confidence.

Security at a Glance
Secure data practices
No training on your data
SOC 2 Type II
Controls independently assessed for effectiveness over time
HIPAA compliant & independently audited
Ongoing independent audits for added assurance over time
End-to-End Encryption
Data protected in transit and at rest
Audited & tested
Logging and monitoring to support traceability
Responsible AI

Doc Chat is built for high-stakes work where verification matters.

Source-linked outputs to support review and validation
Human-in-the-loop workflows by design
Controls that help reduce overreach in responses and keep work auditable
No shortcuts in review, with every line of every document read
Vendor Risk & Procurement
SOC 2 Type II
HIPAA compliance documentation & BAA template (Upon Request)
Security questionnaires (Upon Request)
Architecture and data flow overview (Upon Request)
Request Security Packet
Core Controls
Encryption
Access management
Monitoring and audit logs
Secure development
Incident response and resilience
Customer Data Handling
Customer data is used to deliver the service you request
We do not sell customer data
Retention and deletion expectations can be aligned during contracting
Offboarding support available for data lifecycle needs
Certifications & Attestations

SOC 2

Upholding Excellence in Security and Privacy: SOC 2 Type II Certified.

Our SOC 2 Type II certification demonstrates our unwavering commitment to maintaining the highest levels of data security and privacy. System and Organization Controls (SOC) validates the security and integrity ofthe internal controls and information systems. SOC 2 has been widely accepted as a US standard for information security. It is used by SAAS companies as well as financial organizations, insurance companies, and data centers. SOC 2 Type I assesses the design of security processes at a specific point in time while Type II evaluates the control effectiveness of the same policies and procedures during a specified period – often 6-12 months.

Download the Type II report

HIPAA

Upholding Excellence in Privacy and Security: HIPAA Compliant & Audited.

Our HIPAA compliance reflects our alignment with the Health Insurance Portability and Accountability Act and its implementing regulations, including the HIPAA Privacy Rule, Security Rule, and Breach Notification Rule. We maintain appropriate administrative, physical, and technical safeguards to help ensure the confidentiality, integrity, and availability of protected health information (PHI) and support customers with a Business Associate Agreement (BAA) where required.

Privacy
We follow privacy-by-design principles and support customer requirements around data handling, retention, and deletion.
Navigate your document and data needs with confidence.
View Pricing Options