Account isolation
Source indexes, metadata, and answer events are scoped to the account boundary.


security & compliance
VeriCite handles institutional source material through access boundaries, source ownership, safe fallbacks, and reviewable answer events.
security packet
Source indexes, metadata, and answer events are scoped to the account boundary.
Institutions decide which content is approved, ingested, retrieved, and cited.
Answers use configured account, role, and connector boundaries.
Answers, citations, fallback reasons, and handoffs are structured for review.
Privacy, terms, DPA, cookies, and subprocessor pages remain available for procurement.
Architecture and deployment controls can be reviewed before rollout.
Unsupported or sensitive questions can route to staff with context attached.
Retention, export, and review expectations are handled as deployment decisions.
The public site avoids certifications or customer metrics that are not verified here.
security model
The highest-risk failure is an answer that cannot be traced. VeriCite’s security model is designed to make source boundaries visible.
VeriCite checks account, role, and source constraints before an answer is produced.
The product keeps source material attached to the answer path so teams can inspect support and gaps.
When approved material cannot support an answer, VeriCite can route to a person instead of improvising.
Answer events, cited sources, and handoff data are structured for institutional review workflows.
four pillars
the fallback taxonomy
VeriCite declines questions outside the approved source set. The fallback is named, logged, and reviewable so the source owner can decide whether the source set or the escalation path needs to change.
read the research"missing_source": // not in approved sources
"out_of_scope": // role-scoped away
"restricted_record": // sensitive source boundary
"low_confidence": // below confidence floor
"source_conflict": // sources disagree
a 30-minute walkthrough
Bring security, IT, and the source owner. We will walk through access scope, citations, fallback behavior, and operational review.