Skip to main content

Compliance Guide

Updated today

This guide explains how BlazeSQL supports compliance with specific regulatory frameworks. For each framework, we describe what BlazeSQL does, how to configure it for your requirements, and what documentation is available.

For BlazeSQL's general security posture, see the Security Overview.

Requirement

How BlazeSQL Addresses It

BAA coverage

Sign BAA with BlazeSQL for enterprise contract

Access controls

Use SSO (SAML/OIDC) with your organization's identity provider

Audit trail

Enable enterprise logging for user activity, security events

Data deletion

Use self-service deletion controls; request bulk deletion via support

To set up a HIPAA-compliant deployment: Contact [email protected] to discuss your requirements and initiate the BAA process.

FERPA — Family Educational Rights and Privacy Act

Who This Applies To

Educational institutions that receive funding from the U.S. Department of Education and handle student education records.

How to Configure BlazeSQL for FERPA Requirements

FERPA restricts disclosure of personally identifiable information from education records. BlazeSQL can be configured so that student data never leaves your institution's control.

Data Sharing Agreements: FERPA's "school official" exception requires specific contractual language governing access to student data. BlazeSQL can work with your institution to establish appropriate data sharing agreements that include required FERPA provisions. Contact [email protected] to initiate this process.

Recommended FERPA Configuration:

Requirement

How BlazeSQL Addresses It

Student data stays within institution control

Use Desktop app (results stay local) or Database Connection API (results stay in your infrastructure)

No unauthorized disclosure

Only invited users can access databases; admin controls all permissions

AI model does not retain student data

Zero Data Retention on all AI calls — data is not stored or used for training

Audit capability

Enterprise logging tracks who accessed what data and when

Data minimization

BlazeSQL needs only schema metadata to generate queries. With offline mode enabled (default), actual student records stay on the user’s device.

What syncs to BlazeSQL servers (even with Desktop app):

  • Schema metadata (table names, column names, data types)

  • Chat messages (your questions to the AI)

  • Database Credentials, except for SQL Server with Windows Authentication, or Entra authentication

If your table or column names contain student-identifiable information, the Desktop app or Database Connection API configuration prevents actual record data from leaving your environment, while schema metadata is encrypted in transit and at rest.

Recommended deployment for universities:

  1. Use the Desktop app with default settings (offline mode on)

  2. Or deploy the Database Connection API so query execution stays within your infrastructure

  3. Enable SSO to integrate with your campus identity provider

  4. Enable enterprise logging for FERPA audit requirements

HECVAT: BlazeSQL can complete the Higher Education Community Vendor Assessment Toolkit (HECVAT) questionnaire for universities that require it as part of their vendor assessment process. Contact [email protected] to request a completed HECVAT.


GLBA — Gramm-Leach-Bliley Act

Who This Applies To

Financial institutions that handle nonpublic personal information (NPI) of customers.

How to Configure BlazeSQL for GLBA Requirements

GLBA requires financial institutions to protect the security and confidentiality of customer NPI. BlazeSQL's security controls — AES-256 encryption, access controls, SSO, audit logging, and incident response — support GLBA safeguard requirements.

Recommended configuration for financial institutions:

  • Use Desktop app or Database Connection API to keep customer financial data within your infrastructure

  • Enable SSO with your institution's identity provider

  • Enable enterprise logging for audit and compliance reporting

Financial institutions should evaluate BlazeSQL's controls against their specific GLBA compliance requirements. See the Security Overview for full details.


PCI DSS — Payment Card Industry Data Security Standard

BlazeSQL does not process, store, or transmit payment card data. Payment processing is handled by Stripe, which is PCI DSS Level 1 certified.


SOC 2

BlazeSQL runs exclusively on Google Cloud Platform, which holds SOC 1, SOC 2, and SOC 3 certifications covering its security, availability, and confidentiality controls.

BlazeSQL's application-layer security controls (access management, encryption, logging, incident response) are documented in the Security Overview and Vendor Security Assessment.


Data Residency

Data residency requirements vary by regulation and jurisdiction:

Regulation

Data Residency Consideration

GDPR

Personal data of EU residents can be transferred outside the EEA with appropriate safeguards (e.g., Standard Contractual Clauses). BlazeSQL is based in Luxembourg (EU) and uses SCCs for any non-EEA transfers.

HIPAA

No specific geographic requirement, but PHI must be protected per BAA terms regardless of location.

FERPA

No specific geographic requirement, but data must be under institutional control. Desktop app or DB Connection API recommended.

GLBA

No specific geographic requirement, but safeguard requirements apply.

For enterprise deployments requiring specific data residency, BlazeSQL can be deployed in dedicated GCP regions. Contact [email protected] to discuss options.


General Configuration Guidance

Maximum Data Isolation

For organizations with the strictest compliance requirements, regardless of specific regulation:

  1. Database Connection API — Query processing stays within your infrastructure. BlazeSQL sends SQL queries to your API endpoint; results go directly from your storage to the end user's device.

  2. Desktop App (offline mode) — Query results never leave your device. Schema metadata and chat messages still sync to BlazeSQL servers (encrypted).

Data Flow Comparison

Deployment Model

Schema Metadata

Query Results

Chat Messages

AI Processing

Desktop App (default)

BlazeSQL servers (encrypted)

Local device only (offline mode on by default)

BlazeSQL servers (encrypted)

GCP Vertex AI (ZDR)


Database records excluded by default

Web App

BlazeSQL servers (encrypted)

BlazeSQL servers (encrypted)

BlazeSQL servers (encrypted)

GCP Vertex AI (ZDR)

DB Connection API

BlazeSQL servers (encrypted)

Customer infrastructure

BlazeSQL servers (encrypted)

GCP Vertex AI (ZDR)

Common Questions

"Can we get a BAA?"

Yes. BlazeSQL has a BAA with Google and can sign BAAs with enterprise customers for HIPAA compliance. Contact [email protected].

"Do you support our compliance framework?"

If your framework isn't listed here, contact us. BlazeSQL's flexible deployment model (Desktop, Web, DB Connection API) can be configured to meet specific regulatory requirements.

"What's the fastest way to evaluate BlazeSQL for compliance?"

  1. Start with the Desktop app for a zero-risk proof of concept (query results stay local with offline mode, on by default)

  2. Contact [email protected] for your specific compliance discussion


Contact

For compliance questions, BAA requests, or regulatory framework discussions:


© Blaze Analytics vGmbH (LU35935057), 23 Boulevard Friedrich Wilhelm Raiffeisen, 2411 Luxembourg

Did this answer your question?