Trust & Security Center

Built on 100% Microsoft Azure - Enterprise-grade security and compliance for your peace of mind

AI Transparency & Data Privacy

Your Data is Never Used to Train AI Models

We are committed to absolute transparency about our AI usage. Your business data, customer information, and evaluation results are NEVER used to train, fine-tune, or improve any AI models. Your data remains 100% private and confidential to your organization.

Our AI Technology

StingerAI uses Azure OpenAI Service with the GPT-4.1 model to generate intelligent, context-aware evaluation questions based on your business type, target customer profiles, and publicly available customer reviews from Google and Yelp.


Model Details:

Provider: Microsoft Azure OpenAI Service

Model: GPT-4.1 (Latest generation)

Deployment: Private, dedicated instance

Region: East US 2 (Azure)

Zero Training on Your Data

Microsoft Azure OpenAI Service operates under strict data privacy agreements. Your data sent to the AI service is:

? NOT stored by OpenAI or Microsoft beyond the request

? NOT used for training or improving base models

? NOT shared with other customers or third parties

? NOT reviewed by human moderators (unless abuse reported)

? Encrypted in transit and processing

? Deleted immediately after generating your questions

What Data We Send to AI

When generating custom questions, we send ONLY the following non-sensitive information:

Business Type: Your industry category (e.g., "Restaurant," "Retail Store")

Target Customer Profile: Demographic attributes you define

Location Info: City, state, and business name

Public Reviews: Customer feedback from Google/Yelp (already public)

We NEVER send employee data, customer PII, financial information, or evaluation results to AI.
Enterprise-Grade AI Security

Our AI implementation follows Microsoft's strictest security standards:

Private Deployment: Dedicated Azure AI instance, not shared

Azure Virtual Network: AI calls isolated in private network

Managed Identity: Secure authentication without API keys

Content Filtering: Automatic abuse & jailbreak detection

Prompt Injection Protection: Guards against malicious inputs

Compliance: SOC 2, HIPAA, ISO 27001 certified

How StingerAI Works

When you create a target customer persona and generate questions:

Step 1: You define your business type and customer profile in our guided wizard

Step 2: We fetch public reviews from Google/Yelp about your location (no private data)

Step 3: Azure AI analyzes patterns and generates relevant evaluation questions

Step 4: You review, select, and customize the generated questions before use

Result: Hyper-relevant questions tailored to YOUR business - No data retained by AI

Questions About Our AI Usage?

We believe in complete transparency. If you have any questions about how we use AI, what data is processed, or our privacy practices, please contact our security team at security@stingercompliance.com. We're happy to provide detailed technical documentation and answer any concerns.


Security & Infrastructure

100% Microsoft Azure

Our entire infrastructure runs on Microsoft Azure, leveraging enterprise-grade cloud services with 99.99% uptime SLA and global redundancy across multiple data centers.

End-to-End Encryption

All data is encrypted at rest using AES-256 encryption and in transit using TLS 1.3. Your sensitive information is protected at every layer of our infrastructure.

Secure Authentication

Multi-factor authentication (MFA), OAuth 2.0, and JWT token-based authentication ensure only authorized users can access your data.

Azure Cosmos DB

Data stored in globally distributed Azure Cosmos DB with automatic backups, point-in-time recovery, and 99.999% availability guarantee.

Automated Backups

Continuous automated backups with geo-redundant storage ensure your data is protected against disasters and can be restored to any point in time.

Regular Updates

Microsoft Azure handles infrastructure patching and updates automatically, ensuring you always benefit from the latest security improvements.


Technology Stack

Cloud Infrastructure

? Azure App Service: Hosting for web applications with auto-scaling

? Azure Cosmos DB: Globally distributed NoSQL database

? Azure Storage: Secure blob storage for files and documents

? Azure CDN: Global content delivery network for fast performance

? Azure Key Vault: Secure management of secrets and certificates

Development Framework

? .NET 10: Latest Microsoft development platform

? Blazor WebAssembly: Modern client-side web framework

? ASP.NET Core: High-performance web API framework

? Entity Framework Core: Modern data access technology

? C# 14.0: Type-safe, modern programming language


Compliance & Standards

SOC 2 Type II

Microsoft Azure complies with SOC 2 Type II standards for security, availability, and confidentiality.

HIPAA Compliant

Azure infrastructure meets HIPAA requirements for handling protected health information (PHI).

GDPR Ready

Built with GDPR compliance in mind, with data residency options and right-to-delete capabilities.

ISO 27001

Azure data centers are ISO 27001 certified for information security management.

PCI DSS

Payment processing through PCI DSS compliant payment gateways ensures credit card data security.

FedRAMP

Azure meets FedRAMP standards for U.S. government cloud security requirements.


Security Protocols & Best Practices

Network Security

� TLS 1.3 encryption for all data in transit

� Azure DDoS Protection Standard

� Web Application Firewall (WAF) protection

� Azure Virtual Network isolation

� Network Security Groups (NSGs)

� Azure Private Link for secure connections

Data Protection

� AES-256 encryption at rest

� Geo-redundant storage (GRS)

� Automated continuous backups

� Point-in-time restore capabilities

� Data residency controls

� Immutable blob storage for audit logs

Access Control

� Role-Based Access Control (RBAC)

� Multi-Factor Authentication (MFA)

� OAuth 2.0 and OpenID Connect

� JWT token-based authentication

� Session management and timeout controls

� Principle of least privilege enforcement

Monitoring & Logging

� Azure Monitor for real-time monitoring

� Application Insights for performance tracking

� Comprehensive audit logging

� Threat detection and alerts

� Security incident response procedures

� 24/7 automated security monitoring


Business Continuity & Disaster Recovery

99.99%

Uptime SLA

Azure's commitment to availability

< 4 Hours

Recovery Time Objective

Maximum time to restore services

15 Minutes

Recovery Point Objective

Maximum acceptable data loss

Global Infrastructure

Your data is hosted in Microsoft Azure's state-of-the-art data centers with:

? 60+ regions worldwide

? Physical security with biometric access

? 24/7 on-site security personnel

? Redundant power and cooling systems

? Fire suppression and environmental controls

? Geo-redundant replication across regions


Privacy & Data Handling

Data Ownership

You retain complete ownership of your data. We never sell, share, or use your data for any purpose other than providing our services to you. Your data can be exported or deleted at any time.

Data Minimization

We collect only the minimum data necessary to provide our services. Personal information is anonymized wherever possible, and we automatically purge unnecessary data based on retention policies.

Data Residency

Choose where your data is stored with Azure's global regions. We support data residency requirements and can ensure your data remains in specific geographic locations.

Transparency

We maintain clear privacy policies and terms of service. You can access detailed logs of all actions performed on your data and receive notifications of any security-related events.


Security Testing & Audits

We maintain the highest security standards through rigorous testing and third-party audits:

? Quarterly penetration testing by independent security firms

? Annual SOC 2 audits for compliance verification

? Automated code scanning with static analysis tools

? Vulnerability assessments and remediation tracking

? Dependency scanning for third-party libraries

? Compliance monitoring for industry standards


Incident Response & Support

In the unlikely event of a security incident, we have comprehensive procedures in place:

Detection

24/7 automated monitoring and threat detection systems immediately identify potential security incidents

Response

Our security team is alerted immediately and begins incident response procedures within minutes

Containment

Affected systems are isolated, and measures are taken to prevent further unauthorized access

Communication

Affected customers are notified within 72 hours with detailed information about the incident

Resolution

Root cause analysis and remediation steps are implemented to prevent future occurrences


Security Resources & Contact

Report Security Issues

If you discover a security vulnerability, please report it to our security team immediately:

security@stingercompliance.com We take all security reports seriously and typically respond within 24 hours.
Powered by Microsoft Azure

Our entire infrastructure runs on Microsoft Azure's enterprise-grade cloud platform, ensuring the highest levels of security, reliability, and performance for your compliance needs.

Last updated: March 17, 2026
Stinger Compliance

Customer Experience Management powered by AI secret shopping.

Contact
Support

support@stingercompliance.com

1-800-STINGER


�2026 Stinger Compliance Holdings LLC. All Rights Reserved

Rejoining the server...

Rejoin failed... trying again in seconds.

Failed to rejoin.
Please retry or reload the page.

The session has been paused by the server.

Failed to resume the session.
Please retry or reload the page.