Security & responsible disclosure
Last updated · May 10, 2026
We take the security of donoriq.ai and the DonorIQ product seriously and welcome reports from researchers acting in good faith. The site is operated by Ignitec Inc. DonorIQ is a product of Ignitec Inc.
Product security posture
DonorIQ is architected to HIPAA and SOC 2 standards. Formal third-party audits are in progress. We are not yet certified.
- Encryption. Data is encrypted in transit (TLS) and at rest.
- Tenant isolation. Single-tenant by default. Each customer environment is logically isolated. DonorIQ Cloud or deployment inside your own environment.
- Access control. Role-based access. Users see only cases and data they are permitted to access. SSO and MFA available.
- Audit logging. Immutable event logs record AI outputs, reviewer actions, overrides, escalations, and qualified human sign-offs.
- BAAs. Contact us to discuss your requirements as you evaluate.
- Model training. Customer data is not used to train shared models. Optional tenant-local pattern support is separately configured and scoped to that customer environment.
For security review questions, vendor assessments, or BAA discussions, contact security@donoriq.ai.
Our approach to website security
We follow industry-standard administrative, technical, and physical safeguards appropriate for the information handled by this website. We continuously review and improve those safeguards.
Reporting a vulnerability
If you believe you have found a security issue affecting donoriq.ai or the DonorIQ product, email security@donoriq.ai with:
- a description of the issue and its potential impact,
- steps to reproduce, including URLs and any relevant requests,
- your name or handle if you would like attribution.
Please give us a reasonable opportunity to investigate and remediate before any public disclosure.
Safe harbor
Good-faith research conducted in accordance with this policy will not be pursued by Ignitec. We will work with you to understand and resolve the issue and will not refer good-faith researchers to law enforcement.
To stay within scope, please:
- only test against accounts and data that belong to you,
- do not access, modify, or delete data that is not yours,
- do not perform denial-of-service, brute-force, social engineering, or physical attacks,
- do not test third-party services we do not operate, and
- do not publicly disclose details before we confirm a fix.
Out of scope
The following are out of scope for this program: social engineering of Ignitec employees or contractors, physical attacks, denial-of-service, attacks against third-party services we do not operate, and reports based solely on automated scanner output without a demonstrable security impact.
A note on data
Do not send confidential, regulated, or patient information in your report. Redact anything sensitive before attaching it.