IQONEX

How we build GDPR-tight AI

Concrete tech architecture instead of marketing assurances: what we host where, how we encrypt, with which contracts — auditable in detail.

Data residency

All AI workloads run in EU regions. Standard stack:

Encryption

LayerStandardNote
TransportTLS 1.3Modern cipher suites only, no legacy versions.
At restAES-256Azure Storage Service Encryption, Hetzner LUKS volumes.
PseudonymizationPer callWe replace direct personal references locally before the model sees them.
Key managementAzure Key Vault / HSMRegular rotation, audit trail on access.

Pseudonymization pattern

Every model call that might involve personal data runs through a local pseudonymization layer:

  1. Detect: regex / NER / explicit field marking on the input form.
  2. Replace: stable tokens (e.g. client name → Client_42) per request mapping.
  3. Model call: the model sees only structured pseudo data.
  4. Re-identification: after the model response, locally in your domain.
  5. Audit log: mapping kept with access protection so each call stays reproducible.

DPA chain

§203 StGB — professional secrecy

For professional-secrecy holders (lawyers, doctors, tax advisors) the architecture is tailored accordingly:

Audit log

Every model call is logged: timestamp, user identity (via Entra ID), model + version used, pseudonym hash of input, pseudonym hash of response. Retention per agreed period (6–10 years in regulated industries, often 12–24 months in Mittelstand workflows). Logs are reproducible, tamper-evident (hash chain), EU-resident.

EU AI Act

We classify each use case under the AI Act risk classes:

Risk classExamples from our practiceObligations
LimitedCorrespondence, research, summaries, anamnesis prepTransparency duty (label as AI), DPIA when personal data is involved
HighAI in HR decisions, diagnostic support, critical infrastructureConformity assessment, logbook, risk management, human oversight
Prohibited / We don't buildSocial scoring, real-time biometric surveillance, manipulative AI

If your use case lands in "high risk", we say so in the intro call — and decide together whether the conformity assessment fits the budget or whether to redesign the use case.

What we don't do

Documents shipped on engagement

Detailed architecture discussion?

If your DPO or compliance team has detailed questions, we're ready — we'll bring the stack and contracts in document depth to the intro call.