Built for an industry where IP is everything.

Narrative.new does not train on your work. Our trust model is built around controlled access, managed infrastructure, and a transparent path into real security review when a serious buyer needs more detail.

No Training on Your Work

Customer content is not used to train or fine-tune Narrative.new models, and we do not opt in to provider training programs with customer inputs or outputs.

Controlled Access

Projects and team workflows are protected through authenticated access, role-based permissions, and database-enforced access controls.

Serious Review Support

For teams that need a deeper evaluation, we support direct security review conversations rather than vague enterprise reassurance.

What we can share today

Customer content

Narrative is built for private story-development work. Customer content is processed to provide the service and is not used to train Narrative.new models.

We use third-party AI providers for certain features, but we do not opt in to provider training programs with customer inputs or outputs.

Access and permissions

Access to projects and collaboration spaces is controlled through authenticated accounts, role-based permissions, centralized authorization checks, and database-enforced access controls.

Internal access follows least-privilege principles and is limited to what is required to operate and support the service.

Infrastructure security

Data is protected in transit and at rest through the security controls of managed infrastructure providers.

We rely on established managed platforms for hosting, authentication, and core data services.

Review process

If a buyer needs a real evaluation, we can provide additional documentation, answer questionnaires, and work directly with legal, procurement, and security teams.

We keep the public page high-level on purpose and move into deeper detail in the right review context.

Current status

  • AI training:Narrative does not train on customer work.
  • Encryption:Data is protected in transit and at rest through managed provider controls.
  • Access model:Authenticated access, role-based permissions, centralized authorization checks, and database-enforced access controls.
  • Security review:We support direct review conversations and can provide more detailed materials during active evaluation.

Need material for a real security review?

We keep the public page concise on purpose. If your team needs a real evaluation, we can provide additional documentation, answer questionnaires, and walk through the current posture directly.

What we provide

  • Security overview and follow-up materials
  • Questionnaire support
  • Direct security and legal conversations
  • Architecture discussion at the appropriate level
  • Additional documentation for active review