How your data flows through Nectos

Full transparency on every step — from your input to the AI response and back.

Nectos is designed so you always know where your data is, who can access it, and what happens to it. This page documents exactly how data flows through the Nectos platform.

Deployment modes

SaaS (Pro & Team)

Fully managed by Adopt-AI SA on Swiss infrastructure. Your data is processed and stored in Switzerland. No setup required.

Enterprise

Deployed on customer-designated Swiss cloud infrastructure or on-premise. Customer controls the hosting environment.

SaaS data flow

1

You send a message

Your input is received over an encrypted HTTPS connection (TLS 1.3) and enters Swiss infrastructure immediately.

2

Optional anonymization

If enabled, the anonymization layer scans for PII and removes or replaces it before further processing.

3

AI processing

Your input is processed by the AI model running on Swiss servers. No data leaves Switzerland at this step.

4

Optional web search

If web search is enabled and triggered, an anonymized query is sent to the search provider. The result is returned to Swiss infrastructure for synthesis.

5

Response delivered

The AI response is returned to you over an encrypted connection. The interaction is logged to your audit trail within Swiss infrastructure.

Enterprise data flow

1

Customer-controlled entry

Data enters the customer's designated Swiss infrastructure environment directly.

2

Connector layer (MCP)

Enterprise connectors pull context from authorized sources (Drive, SharePoint, Confluence, etc.) within the customer's environment.

3

AI processing

Processing occurs within the customer-controlled environment. Adopt-AI SA staff have no access to the data.

4

Audit logging

All interactions are logged to the customer's own audit infrastructure.

Our data guarantees

All data is stored and processed exclusively in Switzerland

No customer data is ever used for AI model training or fine-tuning

All data in transit is encrypted with TLS 1.3

All data at rest is encrypted with AES-256

Data deletion requests are executed within 30 days

Architecture principle

Nectos is designed with a data residency-first architecture. Every design decision — from model selection to search integration — is evaluated against a single constraint: does this require data to leave Switzerland? If yes, it is either redesigned, made optional, or accompanied by mandatory anonymization.

Questions about data handling?

Our team is happy to walk through the technical architecture, provide the DPA, or answer your security questionnaire.