How 366 protects your data, infrastructure, and AI workloads across deployment models.
366 is designed following a “security by design” approach, integrating:
The platform is available in two deployment models:
SaaS
Hosted and operated by 366
On-Premise
Deployed within the customer's infrastructure or via a dedicated appliance
Security responsibilities differ depending on the selected deployment model.
366 SaaS is hosted in Europe on cloud infrastructure operated by Scaleway (France / EU).
The architecture includes:
The SaaS platform is designed to ensure a 99.8% availability target, excluding scheduled maintenance windows.
In On-Premise deployments:
Availability commitments apply exclusively to SaaS environments.
In SaaS environments:
Customers remain responsible for retaining original source files outside the platform.
In On-Premise environments, backup strategy remains under customer responsibility.
The platform includes:
In SaaS environments, Prompts and generated Outputs may be temporarily retained (up to 30 days) for security and abuse prevention purposes.
Alternative retention settings may be considered upon request, subject to legal and security constraints.
366 may leverage:
The hosting infrastructure is located within the European Union.
Certain AI model providers may operate outside the EU. Where applicable, appropriate contractual safeguards are implemented in accordance with GDPR requirements.
Third-party providers act solely for the execution of inference requests initiated by customers.
366 follows a continuous update policy designed to:
Proactive vulnerability monitoring and structured update cycles are integrated into the product lifecycle.
Detailed technical documentation is available upon request under NDA. The following documents can be provided to qualified organizations:
Business Continuity Plan (BCP)
Disaster recovery procedures and continuity strategy
Safeguard Plan
Data protection measures and incident response framework
SLA Matrix
Detailed service level targets by deployment model
Security Procedures
Access control, encryption, vulnerability management, and audit processes
Infrastructure Architecture
Network topology, segmentation, and deployment specifications
Request access under NDA
Available to customers, prospects in evaluation, and auditors. We typically respond within 48 hours.