Queen City AI
Queen City AI
  • Home
  • Services
    • AI Strategy & Roadmap
    • Workflow Automation
    • Agent Design & Deployment
    • Data Readiness
    • Training & Culture
    • AI Readiness & Governance
    • Analysis & Support
    • Custom Integrations
    • AI Operating Model Design
  • Contact
  • More
    • Home
    • Services
      • AI Strategy & Roadmap
      • Workflow Automation
      • Agent Design & Deployment
      • Data Readiness
      • Training & Culture
      • AI Readiness & Governance
      • Analysis & Support
      • Custom Integrations
      • AI Operating Model Design
    • Contact
  • Sign In
  • Create Account

  • Bookings
  • My Account
  • Signed in as:

  • filler@godaddy.com


  • Bookings
  • My Account
  • Sign out

Signed in as:

filler@godaddy.com

  • Home
  • Services
    • AI Strategy & Roadmap
    • Workflow Automation
    • Agent Design & Deployment
    • Data Readiness
    • Training & Culture
    • AI Readiness & Governance
    • Analysis & Support
    • Custom Integrations
    • AI Operating Model Design
  • Contact

Account

  • Bookings
  • My Account
  • Sign out

  • Sign In
  • Bookings
  • My Account
Futuristic city skyline with vibrant neon lights and digital waves.

QC AI WRITTEN INFORMATION SECURITY PROGRAM (WISP)

Effective Date: January 01, 2026

APPLIES TO: All employees, contractors, systems, and third-party services used to process client or

1. Purpose & Scope

The purpose of this Written Information Security Program (WISP) is to define the administrative, technical, and operational safeguards that Queen City AI (“QCAI”) employs to protect the confidentiality, integrity, and availability of information entrusted to us by clients, partners, and internal stakeholders, particularly in the context of our AI consulting and AI strategy services. This program is essential for ensuring business efficiency and effective workflow automation. 


This program applies to: 


· Client data and systems 


· Internal business systems 


· AI models, pipelines, and derived artifacts 


· All personnel and approved subcontractors 


This WISP is reviewed at least annually and updated as our risk posture or operating environment changes.

2. Access Control

2.1 Principle of Least Privilege


Access is granted strictly on a need-to-know and least-privilege basis to enhance business efficiency. Personnel are granted only the minimum permissions required to perform assigned duties, especially in the context of AI consulting and workflow automation.


2.2 Identity & Authentication


All systems require authenticated user access to ensure security in Artificial Intelligence applications. Multi-Factor Authentication (MFA) is enforced for:

- Cloud infrastructure

- Source code repositories

- Production and staging environments

Shared accounts are prohibited to maintain integrity in AI strategy implementation.


2.3 Access Reviews


Access permissions are reviewed to support effective AI strategy:

- Upon role change

- Upon contract termination

- At least quarterly for production systems

Access is revoked immediately upon offboarding to safeguard workflows.

3. Encryption Standards

3.1 Encryption at Rest


All client data stored in cloud services is encrypted at rest using industry-standard encryption (AES-256 or equivalent), ensuring the security crucial for AI Consulting and AI Strategy initiatives. Encryption is enabled by default for:

- Databases

- Object storage

- Backups

- Vector databases


3.2 Encryption in Transit


All data in transit is protected using TLS 1.2 or higher, which is essential for maintaining the integrity of Artificial Intelligence applications. Unencrypted data transmission is prohibited for client or sensitive internal data, thereby enhancing business efficiency and supporting workflow automation.

4. Key Management

Encryption keys are managed using cloud-native key management services (KMS) where available, ensuring that AI consulting projects maintain strong security protocols. Key access is restricted to authorized system roles, enhancing business efficiency by minimizing risks. Key rotation follows provider best practices, aligning with an effective AI strategy. In client-specific environments, logically separated keys are utilized where applicable, supporting workflow automation and maintaining the integrity of artificial intelligence applications.

5. Logging & Monitoring

5.1 System Logging


Security-relevant events are logged, including: 

- Authentication attempts 

- Privilege changes 

- System access to client data 

Logs are retained for a minimum of 90 days, unless client requirements specify longer retention. This logging is crucial for maintaining an effective AI strategy, as it enhances business efficiency through better oversight of security events related to artificial intelligence applications.


5.2 Monitoring


Cloud environments are monitored for: 

- Unauthorized access attempts 

- Configuration drift 

- Service availability issues 

Alerts are configured for high-risk events, ensuring that AI consulting practices are supported by a robust framework for workflow automation and security management.

6. Data Classification & Handling Policy

6.1 Data Classification


Queen City AI, as part of its AI consulting services, classifies data into the following categories:




Client Data


Data provided directly by a client, which may include operational, financial, contractual, or proprietary information related to their AI strategy. This data is always treated as confidential to uphold business efficiency.




Internal Data


This includes Queen City AI's business data, such as finance, HR, and internal documentation, which is restricted to authorized personnel to ensure the integrity of our workflow automation processes.




Derived Artifacts


Outputs generated through processing client data, such as embeddings, model outputs, and structured extractions, are treated with the same confidentiality level as the source client data, reflecting our commitment to responsible artificial intelligence practices.



6.2 Data Use Restrictions


Client data is used solely for the contracted purpose and is never utilized to train public or shared foundation models. Additionally, client data is not shared across clients, ensuring that our AI consulting services maintain the highest standards of privacy.

7. Data Retention & Deletion

Client data retention in the context of AI consulting and AI strategy is governed by contractual terms. Our default policy ensures that we retain client data solely for the duration of the engagement. Upon contract termination or at the client's request, we implement secure deletion methods that adhere to cloud provider secure deletion standards. This approach not only safeguards sensitive information but also enhances business efficiency through effective workflow automation. Confirmation of deletion can be provided upon request.

8. Incident Response Plan

8.1 Incident Definition


A security incident includes any suspected or confirmed:


- Unauthorized access

- Data disclosure

- Data integrity compromise

- System availability disruption affecting client data


These incidents can significantly impact business efficiency, particularly when they involve Artificial Intelligence systems utilized for AI Consulting and AI Strategy.


8.2 Response Timeline


First 24 Hours


- Contain and isolate affected systems

- Preserve logs and evidence

- Conduct initial impact assessment

- Notify internal leadership


24–48 Hours


- Identify root cause

- Assess scope of affected data

- Implement remediation steps

- Prepare client notification if required


48–72 Hours


- Notify affected clients per contractual and legal obligations

- Provide preliminary incident report

- Implement preventive controls

- Begin post-incident review, especially in the context of workflow automation and AI systems.


8.3 Client Notification


Clients are notified promptly when their data is impacted. Notifications include:


- Nature of the incident

- Data involved

- Remediation actions taken

- Recommended client actions (if any) to enhance their own AI Strategy and ensure the integrity of their business processes.

9. Vendor & Sub-Processor Disclosure

Queen City AI utilizes vetted third-party service providers to enhance its AI Consulting services. These vendors are chosen based on their security posture and reliability to ensure optimal business efficiency.  


9.1 Cloud Infrastructure Providers  

Primary cloud hosting providers (e.g., AWS, Azure, GCP) enable a robust AI Strategy.  


9.2 LLM Providers  

Commercial large language model providers are used strictly for inference purposes, ensuring that no client data is used for model training. This aligns with our commitment to secure Artificial Intelligence practices.  


9.3 OCR, Vector DB, and Storage Providers  

We utilize OCR services for document extraction, vector databases for embeddings, and object storage solutions to create client-walled data environments that facilitate workflow automation.  


A current list of sub-processors can be provided to clients upon request.

10. SOC 2 Type I Roadmap (Planned)

Queen City AI, a leader in AI consulting, intends to pursue SOC 2 Type I alignment as the business scales to enhance business efficiency. This initiative aligns with our AI strategy focused on leveraging artificial intelligence for optimal workflow automation. 


Planned Timeline:


• Q1–Q2: Internal control documentation and gap assessment


• Q3: Control implementation and internal audit readiness


• Q4: Engage third-party auditor for Type I examination


This roadmap reflects intent, not certification, and may adjust based on client requirements.

11. Penetration Testing

Penetration testing will be conducted annually or upon significant architectural changes to enhance our AI consulting practices. This testing may include: external vulnerability scanning, configuration reviews, and ensuring that our AI strategy aligns with best practices in artificial intelligence. Findings are tracked and remediated based on severity to promote business efficiency and support workflow automation. 


Governance & Review 


This WISP is owned by Queen City AI leadership and is reviewed annually or upon material changes. Updates related to our AI strategy are communicated internally and made available to clients upon request.

Copyright © 2026 Queen City AI, LLC - All Rights Reserved.

  • Contact
  • Solutions
  • About
  • AI Responsible Use Policy
  • WISP
  • Privacy Policy
  • Discovery
  • Blog

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

DeclineAccept