On-Prem by Default

Data that doesn't leave doesn't get breached.

Every Cast Net Technology product is designed to run inside your infrastructure. On-prem deployment means your data—charts, market data, inventory records, accounting logs—is processed locally. It does not traverse the public internet to reach our servers or any third-party service by default.

We do not operate a SaaS data plane that processes your sensitive data. When we build products, we build them to run in your environment, under your control, behind your access policies.

Cloud deployment is available as an option—on infrastructure you control, with network policies you define. That is a different posture from "your data goes to our cloud." We do not offer the latter by default.

Default data flow per product

Healthcare: charts stay on your Docker host. No PHI in transit to external systems.
Data Boundaries

What goes where — by default, and by choice.

Data at rest

Persistent data—PostgreSQL databases, SQLite files, uploaded documents, extracted text, and event logs—resides within your infrastructure. Database access is limited to service accounts with the minimum required permissions.

Data in transit

Inter-service communication within the Docker Compose stack is network-isolated. External API calls are outbound-only, initiated by the system, and carry no inbound PHI or sensitive data unless explicitly configured.

Optional integrations

Any integration with external services—listing platforms, broker APIs, third-party data providers—is explicit, documented, and operator-initiated. Integrations are never enabled by default for sensitive data flows. Customers evaluate these against their own data policies.

PHI Handling (Healthcare)

No PHI outside your perimeter—by architecture, not policy.

Our healthcare document intelligence pipeline is designed so that Protected Health Information never leaves the deployment host by default. This is an architectural guarantee, not a policy commitment: the processing pipeline has no external HTTP calls during document ingestion, text extraction, ICD-10 detection, or report generation.

OCR processing, text extraction, detection models, and CMS mapping tables all run locally. No chart content, extracted text, detected codes, or patient-identifiable information is transmitted externally during normal operation.

Customer responsibility. Cast Net Technology deploys the system inside your infrastructure. Access control, network segmentation, backup policies, encryption at rest, and log retention are the customer's responsibility. We provide documentation and deployment guidance; we do not manage your infrastructure.

What "no PHI to third parties by default" means technically

Ingestion pipeline has no outbound network calls to AI/LLM APIs during document processing
OCR runs in-process; no cloud OCR API is called
CMS mapping tables are imported locally; no CMS API calls during processing
Report output stored in local PostgreSQL; export is operator-initiated

No regulatory compliance representation

Cast Net Technology does not represent, certify, or guarantee that any product or deployment meets HIPAA, SOC 2, or any other regulatory standard. Customers are solely responsible for their compliance obligations. The on-prem architecture is designed to support—not guarantee—a defensible data handling posture.

Deployment Architecture

Docker-native. Operator-managed. No vendor lock-in.

Products are packaged as Docker Compose stacks. Each service (API, workers, database, cache, observability) runs in an isolated container with defined network and volume mounts. The architecture is inspectable, modifiable, and does not depend on proprietary runtime infrastructure.

API Layer

FastAPI + Python

Task Queue

Celery + Redis

Database

PostgreSQL

Deployment

Docker Compose

Network

Isolated bridge

Least-privilege service accounts: each container has only the database and network permissions required for its function.
Persistent volumes are customer-controlled: data directories are mounted from host paths you define and manage.
Internal network isolation: services communicate on an internal Docker network; only specified ports are exposed to the host.
No vendor-managed runtime: the stack runs on any Linux host with Docker Engine. No proprietary orchestrator required.
Audit logs per service: structured application logs are written to your log infrastructure. Log format and retention are customer-managed.
Audit Logs

Every action, traceable. Every decision, reviewable.

Application-level audit events

User actions, automated pipeline steps, configuration changes, and integration events are logged with timestamps, actor identities, and structured payloads—not just access logs.

Evidence provenance logs

For healthcare: every ICD-10 detection, evidence binding, and flag generation includes the source document, page, offset, and model version. The log is the audit trail.

Product Disclaimers

Plain language on what our products are — and are not.

Healthcare Products

  • Clinical documentation support tools only. Not a substitute for professional medical coding or clinical judgment.
  • All outputs require review by qualified personnel before use in risk adjustment, billing, or clinical decisions.
  • Deployed on-prem; customer-controlled infrastructure. Customer is responsible for data handling, retention, security, and access controls.
  • No PHI sent to third-party services by default. Optional integrations may transmit data; customers must evaluate these independently.
  • No representation is made regarding HIPAA compliance, CMS compliance, or any other regulatory requirement. Customers are responsible for their own compliance obligations.
  • System behavior is evidence-based and conservative. "Needs review" flags are intentional and reflect genuine uncertainty, not errors.

General Product Disclaimer

  • All Cast Net Technology products are provided as-is for the purposes described. No warranty of merchantability, fitness for a particular purpose, or accuracy is made or implied.
  • Cast Net Technology's products are tools to support expert judgment, not to replace it. Qualified domain expertise is required for all consequential applications.
  • Product descriptions on this website reflect intended design and capabilities. Specific features, integrations, and performance characteristics are subject to licensing terms and may vary by deployment.
  • Cast Net Technology does not certify or guarantee that any product or deployment meets HIPAA, SOC 2, or any other regulatory or security standard. Customers are solely responsible for their compliance obligations.

Security is an architectural choice, not a bolt-on.

On-prem by default. Least-privilege access. No telemetry. These aren't features we added — they're decisions we made at the beginning that we never undid. If you have a specific security question about one of our products, ask us directly.