Designed to withstand scrutiny.
Security, compliance, and governance are embedded at the architecture level — not layered on after the fact.
Identity & Access
Role-based access controls govern every operation in the system. Permissions are defined per role and enforced at the platform level.
- Role-based access control (RBAC) for all operations
- Permissions enforced at the system level
- Each action attributed to a specific actor
- Session management with defined timeout policies

Data Integrity
Verified data is locked. Modifications follow a controlled update workflow for full auditability.
- Fields locked after verification with timestamps
- Controlled update workflow for any modifications
- Audit log records all data changes
- Data changes attributed to specific actors
Document Controls
Documents progress through a defined lifecycle. Approved documents are locked and immutable.
- Defined document lifecycle: Draft → Submitted → Under review → Approved
- Approved documents locked and immutable
- Document state transitions recorded with timestamps
- Access controlled by role permissions
Under ReviewRequiredApprovedFinancial Controls
Banking connections are verified through Plaid. Payout records are generated for every transaction.
- Bank accounts verified via Plaid integration
- Payout records generated for every disbursement
- Banking changes require review workflow
- All financial actions auditable
Earnings Distribution
5-Year Pool · Q4 2025

Governance
The platform includes mechanisms for controlled pauses, permission adjustments, and compliance enforcement.
- Controlled pause mechanisms when needed
- Permission adjustments through defined workflows
- Compliance enforcement at the architecture level
- Governance actions recorded in audit trail
Recent Events
Enabled Application Status
Today at 9:42 AM PST
(2025-11-15T18:42:00Z)
Disabled Product Updates
25 Nov, 2025 at 9:42 AM PST
(2025-11-15T18:42:00Z)
Changes to beneficial ownership require identity verification for each owner and compliance review.
Last updated: Oct 1, 2025 - (2025-11-15T18:42:00Z)
Required for FinCEN compliance
Security Practices
Data is encrypted in transit and at rest. Infrastructure follows current security standards.
- Encryption in transit (TLS) and at rest
- Infrastructure follows defined security standards
- Regular security assessments
- Incident response procedures documented


Sansbank is designed for participants who value structure over shortcuts—and systems that scale without losing integrity.