Security
Last Updated: March 9, 2026
ARCStoryKraft uses layered security controls designed for creator workflows, imprint operations, and enterprise-aligned reliability requirements. Security posture is continuously improved through monitoring, hardening, and release controls.
1. Security Architecture
- Authenticated access controls with scoped permissions and session management.
- Service segmentation and least-privilege design principles for operational components.
- Monitoring and anomaly detection for abuse prevention and incident triage.
- Controlled administrative access with audit-focused review practices.
2. Data Handling Boundaries
- Metadata-first processing for workflow operations.
- ARCStoryKraft does not train AI models on imprint assets. Not now, not ever.
- Anonymized logs by default, except where narrowly required for security, fraud prevention, or legal compliance.
3. Authentication and Account Protection
Authentication artifacts are used for user verification, authorization, and account defense only. They are not used for behavioral ad profiling or model training. Users are responsible for maintaining credential hygiene and device security.
4. ARCChain and External Publishing Boundary
For external publishing, ARCStoryKraft security responsibility is limited to platform scope, including ARCChain imprint/rip registration proofs and verification records. Third-party publishing platforms operate under their own security models, terms, and incident processes.
5. Incident Response
- Detection and triage of suspicious activity through operational monitoring.
- Containment and remediation actions proportionate to severity and risk.
- Post-incident review and control hardening to reduce recurrence.
- User-facing notice where required by law or contractual obligations.
6. Compliance Alignment
Security and privacy controls are operated with alignment to major legal frameworks, including EU GDPR, UK GDPR, Canada's PIPEDA, and applicable U.S. state privacy law requirements, subject to jurisdiction and product context.
7. User Best Practices
- Use strong, unique credentials and protect account recovery channels.
- Review project and release actions before final publication.
- Use ARCLibrary publishing workflows when possible for integrated chain and storefront controls.
- Maintain secure local environments when using offline or hybrid workflows.
8. Reporting Security Issues
If you identify a security issue, report it through Support with steps to reproduce, impact scope, and timestamps where possible.
9. Related Policies
Refer to Privacy Policy, Terms of Service, and Cookie Policy for additional legal and data handling details.