Security & Privacy

Your Data Stays
on Your Property.

The Neighborhood Smart Vault was designed from the foundation up so that resident, tenant, and operator data never leaves the building boundary — even for AI inference, security analytics, or smart home automation.

The Data Governance Model

Every architectural decision in the NSV is shaped by these five non-negotiables.

Principle 01

Locality by Default

All Vault AI inference, voice processing, camera analytics, and smart-home automation execute on the local GPU cluster inside the vault. There is no fallback to a cloud provider, no third-party API, and no telemetry routed outside the property.

Principle 02

Resident-Held Keys

Each resident or tenant generates and holds their own encryption keys for personal data and AI session histories. NSV operations staff never have access to the cleartext content of any tenant workload.

Principle 03

Encrypted Everywhere

AES-256 at rest on every storage volume. TLS 1.3 for every internal connection between vault subsystems. Disk-level full encryption with hardware-backed keys means a stolen drive contains nothing intelligible.

Principle 04

Cryptographic Tenant Isolation

In multi-family and commercial buildings, each tenant runs in a hardware-isolated, key-separated compute container. Tenants cannot see each other's traffic, storage, or AI sessions — enforced at the hypervisor, network, and storage layers.

Principle 05

Operator Telemetry Only

NSV operations staff see system-health telemetry — fluid temperature, power draw, network status, hardware faults — and nothing else. Tenant data, AI prompts, voice recordings, and camera feeds are out of scope for our access logs by design.

Audit

Tamper-Evident Logging

Every vault keeps a hash-chained audit log of administrative actions, key operations, and access events. Logs are retained on the local cluster and can be exported to the building owner at any time.

Why On-Premise AI Is Categorically Different.

Cloud AI providers receive every prompt, every voice clip, and every image you send them. They process it on shared infrastructure, retain it for "model improvement," and the only thing protecting it is a privacy policy.

Vault AI doesn't ask you to trust a policy. The hardware running your AI sits in a vault under your building. Your prompts never reach the public internet, because there is nowhere else for them to go. The promise is enforced by physics, not legal language.

Cloud AI

Trust the Policy

Prompts, voice, images traverse the public internet. Stored on shared infrastructure. Retained for model training unless you opt out. Privacy guaranteed by terms of service.

Vault AI

Trust the Architecture

Inference runs on GPUs inside the building's vault. No external network egress for AI traffic. Storage encrypted with resident-held keys. Privacy guaranteed by physical isolation.

How Neighbors Stay Strangers — Cryptographically.

In an apartment building or commercial complex, every tenant shares the same vault hardware. Here is how their data does not.

Layer 1

Hardware Isolation

Each tenant workload runs inside a dedicated virtual GPU partition with its own memory, compute slice, and PCIe channel. Hardware-enforced — not software-enforced.

Layer 2

Network Segmentation

Each tenant lives on its own VLAN. Inter-tenant traffic is blocked at the switch fabric. There is no shared broadcast domain inside the vault.

Layer 3

Per-Tenant Encryption

Storage is encrypted with keys derived from each tenant's enrollment. Even with raw disk access, one tenant's volumes are unreadable to anyone else — including NSV.

Built to the Standards Your Auditors Already Know.

NSV's reference architecture is aligned with the frameworks regulated tenants are required to operate under.

Privacy Frameworks

GDPR & CCPA Aligned

Resident data residency, right-to-erasure tooling, and consent-based processing are built into the Vault AI platform.

Information Security

ISO 27001 / SOC 2 Roadmap

The reference architecture is designed against ISO 27001 Annex A controls and SOC 2 Trust Services Criteria. Formal certification is on the roadmap as deployments scale.

Regulated Industries

HIPAA-Ready Posture

For commercial tenants in healthcare, the per-tenant isolation, encrypted storage, and audit logging support a HIPAA-compliant deployment with appropriate Business Associate Agreements in place.

For the full regulatory and code-compliance picture — including building codes, electrical interconnect standards, and seismic requirements — see our Compliance page.

Have a Specific Security Question?

Auditors, CISOs, IT directors — we'll send you the architecture deep-dive and answer your specific compliance questions directly.

Talk to Our Security Team