Security, Compliance & AI Governance

Wamy is built for enterprise insurance environments where data security, regulatory compliance, and AI governance are non-negotiable. Every layer of the platform is designed to protect sensitive claim data.

Wamy is built for enterprise insurance environments where data security, regulatory compliance, and AI governance are non-negotiable. Every layer of the platform is designed to protect sensitive claim data.

Wamy is built for enterprise insurance environments where data security, regulatory compliance, and AI governance are non-negotiable. Every layer of the platform is designed to protect sensitive claim data.

Your Data.
Your Control.
Our Responsibility.

When evaluating any AI platform for insurance claims, enterprise teams ask critical questions:

  • Where does my data go when it's processed by AI?

  • Is the AI trained on my claim data?

  • Who can access my data inside the platform?

  • What happens if there's a breach?

  • Does this meet our regulatory and compliance requirements?

  • How do you handle attorney-client privileged information?

This page answers every one of those questions.

The Limit of Manual Review

The Limit of Manual Review

Independently Audited. Continuously Compliant.

SOC 2 Type II Certified

SOC 2 Type II Certified

Wamy has completed SOC 2 Type II certification, verifying that our security controls, availability, and confidentiality practices meet the standards required by enterprise organizations. The report is available upon request.

HIPAA Compliant

HIPAA Compliant

Wamy supports HIPAA-compliant handling of protected health information (PHI) for claims involving medical records, injury documentation, and treatment data. Business Associate Agreements (BAAs) are available for all clients.

Regulatory Readiness

Data encryption at rest (AES-256) and in transit (TLS 1.2+)

Annual penetration testing by third-party security firms

Continuous vulnerability monitoring and patching

Incident response plan with defined notification timelines

Employee security awareness training and background checks

Enterprise-Grade Infrastructure

Wamy runs on Google Cloud Platform with enterprise-grade security controls at every layer.

Wamy runs on Google Cloud Platform with enterprise-grade security controls at every layer.

Wamy runs on Google Cloud Platform with enterprise-grade security controls at every layer.

Cloud Infrastructure

Hosted on Google Cloud Platform with enterprise support. Deployable on client-preferred cloud providers (Azure, AWS) for organizations with specific infrastructure requirements.

Data Encryption

All data encrypted at rest using AES-256 and in transit using TLS 1.2+. Encryption keys managed through cloud-native key management services.

Multi-Tenant Isolation

Every client account is fully isolated at the database level using Row-Level Security (RLS). No client can access another client's data — enforced at the infrastructure layer, not just the application layer.

Network Security

Private networking, IP allowlisting, and firewall rules restrict access to authorized systems only. API endpoints secured with authentication and rate limiting.

Where Orchestration Delivers the Most Value

Your Data Belongs to You

Data Ownership

All claim data uploaded to Wamy remains the property of the client. Wamy does not claim ownership of any client content, documents, or analysis produced within the platform.

PII Sanitization

Data Deletion

No Cross-Client Data Sharing

Data Ownership

All claim data uploaded to Wamy remains the property of the client. Wamy does not claim ownership of any client content, documents, or analysis produced within the platform.

PII Sanitization

Data Deletion

No Cross-Client Data Sharing

Data Ownership

All claim data uploaded to Wamy remains the property of the client. Wamy does not claim ownership of any client content, documents, or analysis produced within the platform.

PII Sanitization

Data Deletion

No Cross-Client Data Sharing

Access Control & Audit

From Email to Structured
Claim File

Role-Based Access Control

Activity Logging

AI Decision Audit Trail

Role-Based Access Control

Granular permission controls ensure each user sees only the data and features relevant to their role — adjusters, managers, legal, and executives each have tailored access.

Role-Based Access Control

Activity Logging

AI Decision Audit Trail

Role-Based Access Control

Granular permission controls ensure each user sees only the data and features relevant to their role — adjusters, managers, legal, and executives each have tailored access.

Role-Based Access Control

Activity Logging

AI Decision Audit Trail

Role-Based Access Control

Granular permission controls ensure each user sees only the data and features relevant to their role — adjusters, managers, legal, and executives each have tailored access.

Enterprise Readiness

Flexible Cloud Deployment

Deploy on Google Cloud, Azure, or AWS based on your organization's requirements.

System Integration

REST APIs and webhook support for integration with existing claims management, policy admin, and CRM systems.

Business Associate Agreements

BAAs available for all clients handling protected health information.

Security Hub & Documentation

Comprehensive security documentation including architecture diagrams, data flow maps, and control matrices.

Implementation Support

Dedicated onboarding with security review coordination. Wamy's team works directly with your IT and infosec departments to address vendor assessment questionnaires and compliance requirements.

Questions About Security?

Our security team is available to answer questions, provide documentation, and support your vendor assessment process.