Last updated: February 4, 2026
This document provides a comprehensive technical overview of Tiny IDP's infrastructure, data processing lifecycle, security measures, and compliance framework.
For policy details, see our Privacy Policy. For legal terms, see our Terms of Service.
The following diagram illustrates the complete lifecycle of a document processing request, from client submission to response delivery.
HTTPS request received (TLS 1.3 encryption)
europe-southwest1 region
Encrypted storage bucket (5-15 seconds, AES-256, no public access)
Google Cloud Vision AI
Google Vertex AI (no training on customer data)
In-memory processing
Permanent deletion from storage (unrecoverable)
Metadata only (request ID, timestamp, status code) → No PII or content
JSON response via HTTPS
TLS 1.3 encryption for all API communications with Perfect Forward Secrecy (PFS).
AES-256 encryption for temporary storage (5-15 seconds). Google-managed encryption keys with automatic rotation. No public access.
API keys, service account credentials, and sensitive configuration stored in Google Cloud Secret Manager with encryption at rest, IAM access controls, and audit logging.
Technical logs contain only operational metadata (retained for 12 months):
Logs never contain personal data, content, or any identifiable information.
Tiny IDP implements strict architectural safeguards to ensure complete data isolation between customers:
Unique API keys cryptographically validated on every request. Keys cannot access data from other accounts.
Each request uses unique, randomly-generated storage paths with customer-specific prefixes. IAM policies prevent cross-customer access.
Processing in ephemeral, stateless Cloud Run containers. Each request processed independently with no shared state.
Account data stored with customer IDs as partition keys. All queries scoped to authenticated customer.
The following table summarizes key privacy and security risks along with implemented mitigation measures:
| Identified Risk | Mitigation Measure |
|---|---|
| Unauthorized third-party access | End-to-end encryption and authentication via unique API keys. |
| Data use for unintended purposes | Binding DPA that prohibits data use outside requested extraction. |
| Sensitive data persistence | Ephemeral architecture: data is deleted within seconds of response. |
| International data transfers | 100% processing within Spain (Madrid region, EU). |
For security vulnerability reports, compliance questions, or audit requests