Omics-OS Docs
Cloud PlatformUser Guide

Privacy & Security

How Omics-OS Cloud protects your data

Privacy & Security

Your data security is our priority. Here's how Omics-OS Cloud protects your research.

Data Isolation

Every user session has its own isolated workspace:

  • Separate S3 bucket prefix — Your files are stored in a unique location
  • Session-scoped access — Only your session can access your data
  • No cross-user access — Other users cannot see or access your files
your-session-id/
├── uploads/           # Your uploaded files
├── workspace/         # Analysis outputs
├── plots/             # Generated visualizations
└── exports/           # Downloadable results

Encryption

In Transit

  • TLS 1.3 — All connections to app.omics-os.com use HTTPS
  • Certificate pinning — Prevents man-in-the-middle attacks

At Rest

  • AES-256 encryption — All files in S3 are encrypted
  • AWS KMS — Keys managed by AWS Key Management Service
  • Encrypted backups — Daily backups are also encrypted

Authentication

Anonymous Sessions

  • No personally identifiable information stored
  • Session expires after 24 hours
  • Data deleted after session expiration

Authenticated Users

  • AWS Cognito — Enterprise-grade identity management
  • Secure password requirements — Minimum 8 characters, complexity enforced
  • Optional MFA — Two-factor authentication available
  • Session tokens — Short-lived JWTs, automatically refreshed

Data Retention

TierSession DataAnalysis ResultsAfter Deletion
Trial24 hours24 hoursImmediate
Starter30 days30 days7 days grace
Professional90 days90 days30 days grace
EnterpriseCustomCustomCustom

Right to deletion: You can request immediate deletion of all your data at any time via support@omics-os.com.

What We Don't Do

  • We don't sell your data — Ever, to anyone
  • We don't train AI on your data — Your analyses are not used to improve models
  • We don't share with third parties — No data sharing without explicit consent
  • We don't retain after deletion — When you delete, it's gone

Infrastructure Security

AWS Security

  • VPC isolation — Backend runs in private subnets
  • Security groups — Strict firewall rules
  • No public IPs — Backend services not directly accessible
  • NAT Gateway — Controlled outbound access

Access Control

  • IAM roles — Principle of least privilege
  • No hardcoded credentials — Secrets in AWS Secrets Manager
  • Audit logging — CloudTrail logs all access

Compliance

Omics-OS Cloud infrastructure is designed for:

StandardStatus
GDPRCompliant
SOC 2 Type IIIn progress
HIPAAEnterprise tier only
ISO 27001Planned

Healthcare data: If you're working with PHI (Protected Health Information), contact us for Enterprise tier with HIPAA BAA.

Responsible AI Use

LLM Interactions

  • Your prompts are sent to LLM providers (currently Google Gemini) for processing
  • We use API agreements that prohibit training on customer data
  • No conversation data is stored by LLM providers beyond immediate processing

Bioinformatics Tools

  • All analysis runs in our infrastructure, not third-party services
  • Tool outputs are stored only in your session workspace
  • No external data transmission during analysis

Reporting Security Issues

Found a vulnerability? Contact security@omics-os.com.

We take security reports seriously and will:

  1. Acknowledge within 24 hours
  2. Investigate promptly
  3. Keep you informed of resolution
  4. Credit responsible disclosure (if desired)

Questions?

For security-related questions:

On this page