The platform earns trust through architecture, not assertion. Closed data boundaries. Published policies. SOC 2 in flight. ISO 27001 planned. No anonymous public surfaces.
The Oushvaa platform does not run a free public API, does not publish anonymous datasets to the open web, and does not expose entity records to unauthenticated traffic. Every endpoint requires an API key, a verified session, or institutional academic-program authentication. Premium intelligence stays premium. The data boundary is the same as the trust boundary.
This posture is deliberate. AI-era data products that publish openly are training-set fodder for downstream LLM ingestion — their data ends up answered through ChatGPT or Claude before customers visit. We've taken the opposite position: closed-by-default lets us license selectively (to AI labs under controlled commercial terms in Year 2-3), grant verified academic access (under attribution-required terms from 2027), and price for value (subscriptions reflect the exclusivity).
BiologicsIQ leads the family compliance cycle. SOC 2 Type I observation begins Q4 2026 with a Type II report planned for Q2 2027. ISO 27001 certification follows in 2027 to support EU enterprise expansion. Subsequent products (DrugIQ, MedevIQ, Oushvaa Procure) inherit the policy library and audit firm relationship, reducing per-product compliance lift to roughly 50% of the first cycle.
The policy library covers access control, asset management, change management, code review, encryption, identity and authentication, incident response, key management, secure development lifecycle, third-party risk, vulnerability management, and more. Each policy is versioned, owner-assigned, and reviewed annually. Customer security teams can request the full pack under NDA.
The platform runs on a small, deliberately chosen set of sub-processors: Supabase (Postgres + auth), Vercel (workflow hosting), Cloudflare (CDN, R2 storage, DNS), Resend (transactional email), Anthropic (AI inference), Sentry (error monitoring). Each is documented in the sub-processor list with the purpose, data scope, and DPA status. Changes to the sub-processor list are versioned and notified to customers under signed contracts.
Researchers at recognized institutions will get free Pro-tier access starting 2027, under institutional email verification (.edu, .ac.in, .ac.uk, etc.). Attribution required in publications. The first wave will be invited from AIIMS, ICMR, KMC Manipal, AIMS Kochi, JIPMER for the Indian network, plus reciprocal partnerships in US, UK, EU. Access requires explicit application — not anonymous web scraping.
Security questions, vulnerability reports, contract NDAs, sub-processor inquiries: security@oushvaa.com. We respond within 24 hours on business days. Critical vulnerability reports are acknowledged within 4 hours.