LC
LensCowboy Pipeline
Security & Data Protection
Version 1.0
Updated March 2026
lenscowboy.com

LensCowboy processes sensitive production data — scripts, shot breakdowns, bid figures, and creative strategy. This document outlines the security architecture we've built to protect that data at every layer.

AES-256
per client
Encryption
MFA required
for all users
Authentication
Strict per-client
separation
Data Isolation
30-day policy
on offboarding
Data Retention
01 — Encryption

All sensitive data in LensCowboy is encrypted at rest using AES-256, the same standard used by financial institutions and government agencies. Critically, encryption is applied per client — your data is encrypted with a key that is unique to your account and inaccessible to other clients on the platform.

Encrypted fields include script-derived content, shot descriptions, prompt seeds, and all narrative content derived from your screenplay. Structural metadata (scene counts, shot codes, VFX types) is stored separately and does not contain identifiable script content.

At Rest
AES-256 encryption on all sensitive fields. Per-client keys managed in Google Cloud Secret Manager with access logging.
In Transit
All communication encrypted via TLS 1.2+. HTTPS enforced on all endpoints. No unencrypted data transmission.
Key Management
Encryption keys stored in Google Cloud Secret Manager, never in application code or environment variables. Unique key per client account.
Key Isolation
Your encryption key cannot be used to decrypt another client's data. Keys are cryptographically isolated at the account level.
02 — Authentication

Access to LensCowboy requires multi-factor authentication (MFA) for all users — supervisors, owners, and administrators alike. MFA uses time-based one-time passwords (TOTP) compatible with standard authenticator apps including Google Authenticator, Authy, and 1Password.

Sessions are managed via cryptographically signed tokens stored in httpOnly cookies — inaccessible to browser JavaScript, protecting against cross-site scripting attacks. Session tokens expire automatically and are invalidated on logout.

MFA Required
Time-based one-time passwords required for every account. Compatible with all major authenticator apps. Cannot be disabled.
Secure Sessions
Session tokens in httpOnly cookies. Inaccessible to JavaScript. Protected against XSS attacks by design.
Token Expiry
Session tokens expire automatically. MFA re-authentication required after the session window. Server-side logout invalidates tokens immediately.
Password Security
Passwords hashed using bcrypt with per-user salts. Password reset via secure tokenised email link with 1-hour expiry.
03 — Access Control

LensCowboy uses a role-based access control model. Every user is assigned a role — Owner, Supervisor, or Viewer — and access to data is enforced at the API layer based on that role. A user cannot access data belonging to another client account regardless of their role.

Platform operators have a separate administrative role with access to platform configuration only. Operator access to client data is governed by the same cryptographic isolation that protects clients from each other.

Role Capabilities Data Access
Owner Full project management, bid approval, pipeline push, rate locking Own client data only
Supervisor Breakdown review, shot approval, scene editing, export Own client data only
Viewer Read-only access to approved breakdown and bid Own client data only
Cross-client isolation
No user at any role level can access another client's data. This is enforced cryptographically — not just by permission checks — through per-client encryption keys.
04 — Data Isolation

LensCowboy is a multi-tenant platform. Each client's data is stored in logically isolated partitions keyed to their account identifier. Every database query is scoped to the requesting client's identifier, enforced at the application layer before any data is returned.

This means that even if a session token were compromised, an attacker could only access data belonging to the account associated with that token — never data from another client account.

Logical Partitioning
All data stored with client-scoped identifiers. Every query enforces client boundary at the application layer.
Cryptographic Isolation
Per-client encryption keys mean data cannot be decrypted even if database access were obtained. Keys and data are separate.
Infrastructure Separation
Dedicated service accounts per system with least-privilege access. Each service accesses only the data collections it requires.
No Data Commingling
Your script content, shot breakdowns, and bid data are never used to train AI models or shared with any other client.
05 — AI & Script Security

LensCowboy uses a three-layer security architecture for AI analysis that ensures raw script content never leaves your security perimeter without explicit consent.

Layer 1 parses the script locally — entirely within the platform, with no external network calls. It extracts only structural signals: scene types, action codes, location classifications. No dialogue, no narrative prose, no character names cross this boundary.

Layer 2 sends only the anonymised structural signals to AI analysis — never the original screenplay text. The AI receives a structured manifest, not your script.

1
Local Parse — No network calls
Script is parsed entirely within the platform. Extracts structural signals only. Raw screenplay text stays here.
2
Anonymised Manifest — Structural signals only
Only anonymised scene metadata is passed to AI analysis. No script prose, no dialogue, no character names.
3
AI Analysis — VFX identification only
AI identifies VFX requirements, complexity, and suggests task days from the structural signals. Output is a VFX breakdown — not a script summary.
4
Supervisor Review — Human in the loop
All AI suggestions are reviewed and approved by your supervisor before any pipeline action is taken.
Script Prose Opt-In
If you choose to share script descriptions explicitly for richer AI analysis, this requires a separate opt-in consent at the project level. Default is always the secure path — no prose sharing without explicit consent.
06 — Infrastructure Security

LensCowboy runs entirely on Google Cloud Platform, one of the most audited and certified cloud infrastructure providers in the world. GCP holds SOC 1/2/3, ISO 27001, PCI DSS, and FedRAMP certifications, providing a strong security foundation that our application security layers build upon.

All services run in containerised environments with no persistent state in the compute layer. Secrets are managed centrally with access logging. Database access is governed by least-privilege service accounts with collection-level restrictions.

Component Technology Security Posture
Compute Google Cloud Run Containerised, stateless, auto-scaling. No persistent compute access.
Database Google Cloud Firestore Default-deny security rules. Least-privilege service account access with collection-level IAM conditions.
Secrets Google Secret Manager All API keys, encryption keys, and credentials. Access logged. Per-service account scoping.
CI/CD Google Cloud Build Automated build and deploy pipeline. No manual server access required or permitted.
AI Analysis Google Vertex AI Enterprise AI with data processing agreements. Zero data retention options available.
07 — Audit & Logging

All significant actions within LensCowboy are recorded in an immutable audit log. This includes shot approvals, rate locking events, pipeline pushes, user login activity, and any administrative changes to your project configuration.

Audit logs are append-only — once written, they cannot be modified or deleted by any user including platform administrators. This provides a tamper-evident record of all activity on your account.

Immutable Log
Audit entries cannot be modified or deleted after creation. Tamper-evident record of all account activity.
What's Logged
Shot approvals, rate snapshots, pipeline pushes, user logins, admin changes, offboarding events.
Retention
Audit records retained for the duration of your subscription plus 30 days. Available for export on request.
Audit Export
Audit log export available for enterprise clients on request. Contact your account manager.
08 — Offboarding & Data Deletion

When a subscription ends, your account is suspended immediately. Your data is retained for 30 days to allow for reactivation or data export. After 30 days, all platform-held data is permanently and automatically deleted.

LensCowboy never holds your creative output files. Videos, images, and rendered assets are stored in your Google Drive — they are your property and remain in your control at all times. Platform deletion affects only account configuration and job history.

1
Cancellation — Immediate suspension
Account suspended, scheduler disabled, OAuth access token cleared. You receive a confirmation email.
2
Days 1–30 — Retention window
Data retained for 30 days. Reactivation available. Data export available on request.
3
Day 30 — Permanent deletion
All platform-held data permanently deleted. Deletion confirmation email sent. This action is irreversible.
Your files are always yours
Output videos, source images, and rendered assets live in your Google Drive account. LensCowboy never stores your creative files on our infrastructure. Cancelling your subscription has no effect on your Google Drive content.
09 — Your Data, Your Rights

LensCowboy does not sell, share, or use your data for any purpose other than providing the platform services you've subscribed to. Your scripts, breakdowns, bids, and production data are never used to train AI models — ours or anyone else's.

You have the right to request a copy of all data we hold about your account, request correction of inaccurate data, and request permanent deletion at any time. These rights are fulfilled within 30 days of request.

Your Right How to Exercise Response Time
Data export Contact your account manager or email privacy@lenscowboy.com Within 30 days
Data correction Update directly in platform or contact support Immediately / within 14 days
Account deletion Cancel subscription — auto-deletion after 30-day retention 30 days after cancellation
Data processing query Email privacy@lenscowboy.com Within 14 days
10 — Security Contact

If you have questions about our security architecture, wish to report a vulnerability, or require security documentation for a procurement or compliance process, please contact us directly.

We take security reports seriously and respond to all disclosures within 48 hours. We do not pursue legal action against researchers acting in good faith.

Security Queries
security@lenscowboy.com
For architecture questions, compliance documentation, and enterprise security reviews.
Vulnerability Disclosure
security@lenscowboy.com
Responsible disclosure welcomed. 48-hour acknowledgement. No legal action for good faith research.
Privacy Requests
privacy@lenscowboy.com
Data export, correction, deletion requests, and GDPR/POPIA enquiries.
Enterprise Reviews
For enterprise procurement security reviews, penetration test coordination, and custom DPA requirements.