Security Summary
POVA's baseline model analyzes exported data snapshots in isolated environments without live production access or third-party AI in the analysis path. Deliverables are self-contained offline files. POVA does not retain source data, deliverables, or scan metadata after delivery. Ordinary business records associated with the engagement are retained separately.
Last updated: April 12, 2026
Three categories of data exist during a POVA engagement. Each has a different handling rule.
| Category | What it includes | Where it exists | Retention |
|---|---|---|---|
| Source data | Customer-exported files: CSV, Excel, JSON, database dumps, and other structured exports provided for analysis | Processed within the analysis environment and not sent to third-party services. In POVA-managed deployments, POVA does not create external backups of source data. | Removed from POVA-controlled environments after delivery. In customer-managed deployments, cleanup follows the documented customer-executed procedure. |
| Deliverables | Static HTML report, explorable local HTML finding tree, optional evidence archive containing analysis artifacts and reviewer materials agreed for the engagement | Delivered to the customer. Self-contained offline files with no external references, no callback mechanisms, and no network dependency. Some deliverables may include local scripts for offline navigation. | Owned by the customer. POVA does not retain a copy after delivery. |
| Audit metadata | Data fingerprints (hashes), execution timestamps, software version, configuration, scope manifest, operator identity, coverage notes | Embedded within the deliverables themselves. | Lives with the deliverables. POVA does not retain a separate copy after delivery. Future review, re-validation, or evidentiary preservation depends on the customer retaining the deliverables and manifest. |
POVA does not retain customer source data, deliverables, or scan metadata after delivery. Standard business records associated with the engagement — including agreements, invoices, payment records, and business communications related to scan needs — may be retained in the ordinary course.
No internet connectivity is required during analysis. POVA processes exported data locally. The customer may optionally enable a local network connection for file transfer in and out, but analysis does not depend on it. There are no calls to external APIs, cloud services, or third-party endpoints during processing.
POVA uses deterministic machine learning, statistical methods, and rule-based logic. The same input and configuration produce the same result. Each finding maps to source data, rules, or thresholds. No generative AI, no third-party models, no opaque neural networks in the analysis pipeline.
POVA's output is decision support, not final judgment. The system is designed to surface what it found, disclose what it could not analyze, and make the basis for every finding inspectable.
POVA is an audit and investigation support system. It reduces exposure and improves reviewability, but it does not guarantee detection of every issue or compliance with any specific law, framework, or reporting standard.
POVA supports multiple operation modes depending on the engagement. The scan can be run by a POVA specialist, a trained and approved third party, a customer-designated operator, or on an automated schedule, or a combination of these. The operator model is agreed before the engagement begins. Some controls depend on deployment model and operator mode. Customer-managed infrastructure, local backup behavior, and cleanup execution remain under customer control unless otherwise agreed.
Specialized analytical recipes, white-label deployments, or customer-specific workflows may change the operator model, deliverable composition, or applied controls. Any deviations from the baseline model are agreed and documented before processing begins. In all modes, run initiator, operator role, execution time, scope manifest, and configuration are recorded in the deliverable's audit metadata. Where agreed for the engagement, deliverables can include a signed manifest containing file hashes, execution metadata, and scope information. The customer holds this record.
POVA's analysis engine runs on a hardened Linux OS inside isolated Docker containers, stripped to the minimum required for processing. The operator interacts through a secured control interface. On POVA-managed hardware, the runtime is wiped after report delivery.
Deliverables
POVA deliverables are self-contained offline files with no external references, no callback mechanisms, and no network dependency. Some deliverables may include local scripts for offline navigation, but they do not make remote requests.
Although deliverables contain no network behavior, they may contain sensitive business information and should be stored and shared under the customer's normal data-classification controls. Deliverable composition is defined per engagement and may vary for white-label workflows, specialized analytical recipes, or customer review requirements. Where agreed for the engagement, deliverables can be encrypted and access-restricted. Key management and authentication method are defined per engagement.
Deployment Options
The same analysis engine runs across both deployment models. POVA BOX adds physical hardening.
Documentation
The following materials are available to qualified prospects and customers. Some items are available under NDA.