Trust & Security.

How AOLC protects data and systems across every client engagement.

One Public Reference.

This page is the single public statement of how AOLC runs client workloads — across Managed IT, Cloud & Security, Managed AI, Sovereign AI, and the platforms we build in-house. It is written to be readable by procurement, legal, and compliance teams. Deeper technical detail, sub-processor lists, and pen-test summaries are available under NDA.

1. Data Residency.

Where data sits is not a marketing question — it is an architectural one.

TopicCommitment
AOLC-hosted workloadsAll storage and inference for client workloads that we host (including Sovereign AI by AOLC) runs on South-African-domiciled infrastructure in Johannesburg.
Cross-border transferNone for Sovereign AI workloads. For other services where you choose a global platform (e.g. Microsoft 365, Azure, CodeTwo), data may transit internationally — we disclose this before deployment and never as an afterthought.
Foreign AI APIs on client data pathFor Sovereign AI: zero. No Anthropic, no OpenAI, no Gemini, no Bedrock on the data path. For other AOLC services that use foreign AI providers, we name them in scoping and in the contract.
Model trainingClient content is never used to train any commercial or foreign model. Open-weights models are invoked for inference only — weights are not updated using client data.
Architectural, not contractual. Where it matters, sovereignty is enforced by where the infrastructure sits and what the code does — not only by what the contract says. If the law changes, the architecture still holds.

2. Encryption & Network.

TopicCommitment
Encryption in transitTLS 1.3 on all client-to-AOLC traffic. Certificate pinning available on request for high-assurance engagements.
Encryption at restAES-256 on all AOLC-managed volumes, including orchestration VPSs and GPU working storage. Customer-held-key (BYOK) option available for production Sovereign AI engagements.
Network isolationClient workloads sit in dedicated network segments. Egress is whitelisted to named destinations. No public SSH anywhere in the stack.
VPN & private networkingSecure VPN tunnels available for point-to-point connectivity between client sites and AOLC infrastructure. Private networking between AOLC orchestration and compute where the architecture permits.
HardeningOS hardening to the CIS Level 1 baseline. Host firewall enabled. No default passwords. Automated patching with monthly review.

3. Access & Audit.

TopicCommitment
Authentication (AOLC side)SSH key + MFA for all administrative access. Role-based access control; no shared credentials.
Authentication (client side)Integration with client SSO / Entra ID available for client-facing surfaces. Staff and portal interfaces enforce MFA where required.
Least privilegeOnly the named AOLC engineers listed in the engagement brief have access to client data. The access list is shared with the client and reviewed at each engagement milestone.
Audit loggingImmutable, append-only log of every privileged action, every inference call (Sovereign AI), and every data movement. Exportable to the client on request.
Session managementIdle timeouts, silent token refresh, auto-logout, and global 401 handling are built into every AOLC platform. Tokens expire; no stale sessions.

4. POPIA Operator.

AOLC operates under section 20 of the Protection of Personal Information Act, 2013, when processing client personal information.

TopicCommitment
RolesThe client is Responsible Party and determines purpose and means of processing. AOLC is Operator, processing only on the client's documented instructions.
Purpose limitationProcessing is limited to the purposes set out in the signed engagement brief. Scope creep requires written change request.
ConfidentialityAll AOLC personnel with access to client data are bound by written confidentiality undertakings enforceable beyond the end of the engagement.
Breach notificationSecurity incidents involving personal information are notified to the client without undue delay, and in any case within 72 hours, with a root-cause report within 10 business days. AOLC assists the client in any required Information Regulator communication under s22.
Data-subject rightsAOLC assists the client in responding to access, correction and deletion requests received from data subjects.
Audit rightThe client may audit AOLC's compliance with these terms on reasonable notice. AOLC cooperates in good faith and provides reasonable evidence of compliance.

5. Vendor Onboarding.

What procurement and internal IT teams can expect from us.

TopicCommitment
Vendor packFor any engagement of material scope, AOLC provides a vendor onboarding pack covering scope, architecture, data handling, security posture, and operator terms — the document against which your vendor management function runs onboarding.
InsuranceProfessional indemnity and public liability cover in force. Certificates available on request.
AccreditationsMicrosoft Cloud Solution Provider (CSP). Westcon / Duxbury channel partner. B-BBEE Level 2 contributor (125% procurement recognition).
Penetration testingSummary reports available on request for engagements where the scope warrants it.
Incident responseNamed escalation path. SLA-driven response times. Documented resolution records and post-incident reviews for material incidents.
NDAMutual NDA signed before any client data, architectural detail, or sub-processor list is exchanged.

6. Reversibility.

Lock-in is not a commercial strategy. Every engagement is exit-ready.

TopicCommitment
Exit on noticeEngagements terminate on the notice period agreed in the master agreement. No forced extensions.
Data returnOn termination, AOLC returns all client data — source material, derived metadata, transcripts, logs, and any models fine-tuned on client content — in open formats (JSON, CSV, original file containers).
Cryptographic eraseAfter return, all client data is cryptographically erased from AOLC systems within 30 days. A certificate of destruction is issued to the client.
Portability during engagementClients may request data export at any point during the engagement, in open formats, at no additional charge.
Backup destructionDaily encrypted snapshots are destroyed together with primary data on engagement exit. No hidden retention.

7. Sub-Processors.

TopicCommitment
Engagement-specific listEvery engagement is accompanied by an engagement-specific sub-processor list naming every third party that may process client data.
Change of sub-processorsNo new sub-processor is added to an engagement without the client's prior written consent.
Sovereign AI sub-processorsFor Sovereign AI engagements, sub-processors are limited to South-African-domiciled infrastructure providers. No foreign AI API provider is ever a sub-processor on a Sovereign AI engagement.
Global servicesFor services that use global platforms (Microsoft 365, Azure, CodeTwo, etc.), the sub-processors are the respective platform operators and are disclosed in scoping.
Detailed listThe detailed, current sub-processor list is shared under NDA as part of the vendor onboarding pack for each engagement.

8. Compliance Contact.

For security, compliance, or vendor onboarding queries — not for general sales enquiries.

Direct Contact

What to Include

  • The engagement or proposal you're reviewing
  • The specific compliance framework driving the question (POPIA, ISO 27001, SARB, FSCA, HPCSA, etc.)
  • Whether you need documentation under NDA or a general answer
  • Your deadline, if any

For security incidents potentially affecting an AOLC-managed system, use the same contact path and mark the subject line INCIDENT.

Related Policies.

Privacy Policy

How AOLC handles information collected via this website and in day-to-day business interactions.

Read →

PAIA Manual

Promotion of Access to Information Act manual, as required by South African law.

Read →

Terms & Conditions

General terms covering AOLC's website and standard engagements.

Read →

CSP Addendum

Microsoft Cloud Solution Provider addendum, applicable to CSP-brokered services.

Read →