Enterprise Security

How MIR protects your organization's data, credentials, and policy infrastructure

Last updated: February 2026

Data Protection

Personally Identifiable Information: MIR stores exactly one piece of PII: an email address. This is a deliberate architectural constraint, not a policy preference. No names, profile data, or identity attributes are stored. Participation history is recorded independently of identity and cannot be reverse-engineered into platform activity or personal behavior.

Authentication & Access Control

Infrastructure

Policy API Security

Organizational Controls

Transparency & Auditability

Incident Preparedness

Questions about enterprise security?

We're happy to discuss our security practices and compliance posture in detail.