Security - Notium

Legal

Data and Security

This page explains how we protect your data and how our systems are designed. It is a high level summary meant to be readable by students, not a full security audit.

1. Security overview

Your essays and assignments are sensitive, so we treat them as such. Notium is hosted on modern cloud infrastructure that includes network, application, and account security.

We focus on a few simple principles:

  • Encrypt data in transit and at rest wherever practical.
  • Limit who and what can access production data.
  • Log and review important security events.
  • Keep dependencies and infrastructure reasonably up to date.

2. Data storage and retention

Documents, prompts, tone profiles, and other workspace content are stored in cloud databases and file storage. We keep this data so that your projects, classes, and tones are available when you log in.

We may retain logs and backups for a period of time to help with security, debugging, billing, and legal compliance. If you delete your account we work to remove or anonymise personal data from active systems, while some information may remain in backups for a limited period.

3. Encryption

Connections between your browser or app and Notium use HTTPS so that data is encrypted in transit. Data at rest in our primary databases and file storage is also encrypted by the underlying cloud platform.

Passwords are stored using standard hashing algorithms, not in plain text. We never want or need your full payment card details because our payment processor handles those directly.

4. Access controls inside Notium

Only authorised team members have access to production systems, and that access is limited to the tasks they need to perform. Access is logged and reviewed, and we try to use the minimum level of permissions that still lets us run the service.

Sometimes we may need to inspect logs or individual documents in order to investigate abuse, fix a bug, or provide support. When that happens we access only what is necessary and treat that data as confidential.

5. AI models, detection, and training data

Notium uses AI models to suggest text, rewrite drafts, remember tones, and run detection scans. As described in our Privacy Policy, we may use content from your workspace, along with usage data, to improve these models.

This may include training or fine tuning models to better match real student writing and to better understand how detection tools behave. When we do this we aim to remove direct identifiers where practical and we protect the training data under similar security measures as other production data.

Even with these efforts, no system can perfectly predict or control how third party AI detectors, teachers, or institutions will respond to a piece of writing. We cannot promise any specific detection outcome and you remain responsible for how you use the tool and for any consequences of your submissions.

6. Keeping your account safe

Security is a shared responsibility. Here are a few simple steps you can take:

  • Use a strong, unique password for your Notium account.
  • Do not share your login with friends, classmates, or strangers.
  • Log out on shared or public computers when you are finished.
  • Be careful about uploading documents that contain very sensitive personal information if you do not need that information inside Notium.

If you believe your account has been compromised, contact us at [email protected] and we will try to help.