What You GetHow It WorksPricingAboutBlogFree AuditRun Your Free AuditBook Intro Call
Included with all engagements

Your Customer Data Stays in the US, Stays Private, and Never Trains Someone Else's AI

Trade businesses handle sensitive data every day — home addresses, access codes, financial info, compliance records. Here is exactly how Ironback protects it.

Run your free audit

Quick Answer

AI Data Privacy & ComplianceTrade businesses handle sensitive data every day — home addresses, access codes, financial info, compliance records. Here is exactly how Ironback protects it. Starting at Included with all engagements. Includes 8 deliverables with a satisfaction guarantee.

What You Get

Every deliverable included in this engagement.

  • US-hosted infrastructure — all customer data processed and stored on domestic servers, never routed offshore
  • Dedicated data environments — your business data is isolated from every other client, no multi-tenant mixing
  • Zero model training on your data — customer conversations, estimates, and compliance docs are never used to train AI models
  • Role-based access controls — your team sees only what they need, with full audit trails on every action
  • Encryption at rest and in transit — AES-256 for stored data, TLS 1.3 for everything moving between systems
  • Automated data retention policies — set how long records are kept, with automatic purging when retention windows close
  • CCPA and state privacy law compliance — documented data handling procedures that satisfy California and other state requirements
  • Regular security reviews — quarterly audits of all connected systems, integrations, and access permissions
🛡️
Our GuaranteeIf we cannot demonstrate full compliance with your data handling requirements during the assessment phase, we will not proceed with the engagement.

How It Works

1

Data mapping Week 1

Identify every piece of customer and operational data flowing through your systems — where it lives, who touches it, and where it goes

2

Privacy architecture Week 1-2

Design data handling rules for each system: what gets stored, what gets processed in real time, what gets purged, and what needs encryption

3

Implementation & lockdown Week 2-3

Deploy access controls, encryption, retention policies, and monitoring across all connected platforms

4

Ongoing monitoring Ongoing

Quarterly access audits, integration security checks, and compliance documentation updates as regulations change

Investment

Included with all engagementsRun your free audit

Frequently Asked Questions

Does Ironback use our customer data to train AI models?

No. Your customer conversations, estimates, compliance records, and business data are never used to train any AI model — ours or anyone else's. We process data to run your operations. That is it. No secondary use, no anonymized aggregation, no "improving our product" clause buried in the terms.

Where is our data physically stored?

US-based servers. We use domestic cloud infrastructure for all processing and storage. Your customer data is not routed through offshore data centers, even temporarily. For trade businesses handling home addresses, access codes, and facility information, that is not a nice-to-have. It is a requirement.

What happens to our data if we stop working with Ironback?

You get a full data export in standard formats, and we purge everything from our systems within 30 days. No hostage data. No "contact us to delete" runaround. Your data, your decision.

How is this different from the data handling at offshore VAs or SaaS platforms?

Offshore staffing means your customer data sits on personal laptops in another country, governed by that country's privacy laws (or lack thereof). SaaS platforms pool your data on shared infrastructure with every other customer — including your competitors. Ironback gives you isolated, US-hosted environments where your data never touches another client's systems. That difference matters when a customer trusts you with their home address and alarm code.

We work with hospitals / government facilities / secured sites. Can Ironback handle that?

Yes. Biohazard companies, generator contractors serving hospitals, and fire suppression teams working in secured facilities all handle data with extra sensitivity requirements. Our data architecture supports facility-specific access restrictions, compliance documentation workflows, and audit trails that satisfy facility security reviews.

Ready to get started? Let's talk.

Book a free 30-minute discovery call. No pitch, no pressure — just a conversation about your operation and whether this engagement is the right fit.

Free AI Operations Audit