Skip to main content

Public summary

Security overview

High-level architecture, authentication boundaries, and platform-control summary for organizations that need a serious first-pass review.

Focused summaryReview-ready languageFormal follow-up available

Why this matters

If your organization is trusting Blacklight with resume requests for patrons, members, students, or clients, your team should be able to see quickly how privileged access is limited and where higher-risk actions are controlled.

Security overview · Current public summary

Current summary

The main points a reviewer should actually take away

These points are written to be shareable and review-friendly. They give the reviewer a direct answer in plain language before the conversation turns into a longer procurement or questionnaire exchange.

01

Public intake, partner workflows, and admin operations are separated into different surfaces so the same person is not moving through every part of the system with the same level of access.

02

Sensitive actions such as billing changes, privacy handling, partner-access changes, and high-risk admin actions sit behind stronger authentication requirements and auditability.

03

The platform is designed to keep customer-facing intake simple while keeping privileged operational controls limited to authenticated internal or partner-authorized paths.

04

Blacklight also maintains an automated accessibility baseline across key public review surfaces and preview-safe portal shells, while keeping the trust claim itself narrower than a formal accessibility certification.

Security overview | Blacklight Trust Center