Login
Get Started
Get Started

Enterprise Security & Privacy

Our commitment to protecting your data and maintaining security while delivering powerful AI capabilities

Our Commitments

Enterprise-grade security and privacy by design
Data Ownership
Customer data never used for AI training or model improvement
Logical isolation of all customer data
Customer-controlled data retention periods
Security
Encryption for sensitive data at rest
TLS 1.2+ encryption for all data in transit
SOC 2 Type II certification in process (expected Q1 2025)
Control
SAML SSO integration
Role-based access controls (RBAC)
Comprehensive audit logging and monitoring

System Architecture

Secure, scalable, and enterprise-ready
Input Processing
Secure web interface with TLS 1.2+ encryption
AI Processing
Secure integrations with top-tier cloud providers
Data Storage
Encrypted storage with logical workspace isolation

Data Privacy & Retention

Enterprise-grade data management and compliance
Retention Policies
Standard 30-day retention for deleted content
Configurable retention for active content
Automated purge processes
Compliance Measures
Regular compliance audits
Data protection impact assessments
Comprehensive documentation

Administrative Controls

Comprehensive management tools and monitoring
Access Control
Workspace Administrator
Program Lead
Group Administrator
Configuration
Scenario Management
Scoring Criteria
User Permissions
Monitoring
Real-time Sessions
Performance Analytics
Audit Logging

Technical Specifications

Infrastructure and security details
Security Measures
Cloud security controls
Network segmentation
Regular security assessments
System Constraints
Concurrent session limits
Storage and processing bounds
Language support scope

Other Questions

We maintain strict data handling practices with logical isolation of all customer data in our secure cloud infrastructure. Customer data is protected by strict access controls, with access limited to essential personnel and logged for security purposes. Our infrastructure is designed to prevent any unauthorized access while ensuring your data remains accessible and secure for your business needs. We do not use customer data for training our AI models unless explicitly opted in.
Our platform provides customer-configurable data retention periods to meet your specific compliance and business needs. When data reaches the end of its retention period, we employ secure deletion processes. All data is logically isolated between customers, and access is strictly controlled through role-based permissions. Regular security audits and monitoring ensure ongoing compliance with privacy requirements.
We are currently in the final stages of obtaining our SOC 2 Type II certification, expected in Q1 2025. We regularly undergo third-party security assessments and maintain compliance with industry security standards. Our security program is built on industry best practices, and we continuously update our controls to address emerging threats.
Our AI testing process incorporates multiple validation layers including regular testing against predefined scenarios, automated safety and consistency checks, and human review of edge cases. We conduct regular performance testing and scenario validation to ensure consistency and effectiveness. Our team actively monitors AI interactions and maintains robust safety measures. We employ comprehensive bias testing and mitigation strategies throughout development to ensure fair and equitable treatment across different user groups and scenarios.
Our AI development process incorporates extensive testing for bias, safety, and reliability. We maintain robust monitoring systems and human oversight of our AI models. All models undergo rigorous validation before deployment, including tests for accuracy, fairness, and potential misuse. We regularly update our models and safety measures based on ongoing research and real-world performance data.
Our roleplay creation follows a structured process including template-based scenario development, automated content scanning, multi-stage review, and thorough testing. Each scenario undergoes bias assessment and security validation before deployment.
We maintain a standard 30-day retention period for deleted content with configurable periods for active content. Our compliance measures include regular audits, impact assessments, and comprehensive documentation of all data processing activities.
Our system has specific operational parameters to ensure optimal performance. These include limits on concurrent sessions per workspace, variable response times based on complexity, and defined data storage limits. We provide detailed documentation on these constraints and work with enterprises to optimize their usage within these parameters.
We maintain comprehensive monitoring and testing procedures including regular load testing, performance metrics tracking, and automated system health checks. Our infrastructure is designed for high availability with redundant systems and automatic failover capabilities.