Financial Viability is an AI-assisted financial health monitoring platform developed by Charitability Inc. for funders, impact investors, and public-sector lenders. The product ingests sensitive borrower financials, and we treat that as a privilege. This page documents where your data lives, who touches it, how it’s protected, and how you can audit or remove it. It is the canonical reference we share with auditors, procurement teams, and anyone running a vendor-security review on us.
Last reviewed: April 2026 · Charitability, Inc.
All tenant data — organizations, instruments, analyses, audit entries, watchlist items, uploaded financial statements, and loan security documents — is stored in Google Cloud’s Montreal region (northamerica-northeast1). The primary Firestore database is named financial-viability-db and the storage bucket is regionally pinned to the same Canadian region.
We do not replicate data outside Canada for hosting. The only cross-border data flow is the LLM inference call to Anthropic described in the next section, which sends financial-statement content to their US infrastructure for processing and discards it on completion.
Financial-statement extraction and narrative analysis are powered by Anthropic Claude. The specific model in production is claude-opus-4-5-20251101. The same vendor and model is used for the (optional) loan security document analysis.
Sign-in uses Firebase Authentication with one-time email codes (OTP). There are no long-lived passwords stored anywhere in the system. Sessions are short and refreshed via Firebase’s ID-token mechanism.
Borrower upload portals use signed magic links scoped to a single instrument and a single use. Links expire on first use and re-issue automatically when an admin resends a reminder.
Every user belongs to one or more tenants. Within a tenant they hold one of three roles:
Access is enforced both client-side (UI gating) and server-side (Firestore security rules and authenticated API routes) so a modified client can never escalate.
Every state-changing action writes an immutable entry to a tenant-scoped audit log. Recorded actions include — but are not limited to — user invitations, role changes, organization create / update / delete, portfolio delete, analysis save, watchlist triggers, security-document upload, and security-analysis generation. Each entry captures actor, target, timestamp, and a structured payload so you can reconstruct exactly what happened.
Tenant admins can browse the log directly from the in-app Audit screen and export it on request.
Tenant admins can permanently delete any portfolio or organization from the Settings page. Deletion is gated by a GitHub-style typed-name confirmation: you must literally type the name of the record before the destructive action becomes available.
Server-side, deletes go through dedicated admin API routes that run a recursive cascade — wiping every analysis, instrument, watchlist item, document reference, security analysis, custom indicator, and stored file — before logging the action to the audit trail. There is no soft-delete: the data is gone.
For full account-level off-boarding, contact privacy@charitability.ca and we will delete the entire tenant within 30 days.
We use a deliberately small set of third-party sub-processors. Any additions are announced before they go live and reflected on this page.
LLM inference for financial-statement extraction and narrative analysis. We use the Claude Opus model and ship documents inline in the request body.
Primary data hosting (Firestore, Firebase Auth, Firebase Storage). Tenant data lives in the Montreal (northamerica-northeast1) region.
Transactional email delivery for magic-link uploads, alerts, and account notifications. No financial data is ever included in email bodies.
We build to the OWASP Application Security Verification Standard (ASVS) and treat the OWASP Top 10 (2021) as the floor, not the ceiling. Practical controls that map directly to those categories:
Penetration testing and dependency vulnerability monitoring are run on a recurring cadence; results are available under NDA on request.
Because Financial Viability puts an LLM directly in the path of borrower financials, we also align with the OWASP Top 10 for LLM Applications (LLM01–LLM10, 2025 edition). Each item below is mapped to a concrete control in the product:
Questions, audit requests, or vendor-security questionnaires: security@charitability.ca