Skip to main content
All CollectionsAI Skills
AI Skills: Data Retention Policy
AI Skills: Data Retention Policy

Details on how AI Skills protects user information

Caroline Riley avatar
Written by Caroline Riley
Updated over a year ago

Our AI Data Service is meticulously architected to provide exceptional levels of security, ensuring unparalleled data protection, integrity, and confidentiality. Through Azure's comprehensive security infrastructure, we establish a secure and dependable environment to safeguard user information. Security protocols include:

Secure Azure Storage Solutions
We use Azure's secure environment, known for its multitude of security certifications and advanced protection measures, to securely store user data.

Double Encryption Protocol
Data is doubly encrypted, initially at-rest by Azure and additionally by NMV, then decrypted with our unique encryption keys, offering enhanced security against unauthorized access.

Contractual Zero Data Retention with OpenAI
We have a strict agreement with OpenAI for zero data retention, ensuring that data processed through our service is neither stored nor used by OpenAI to refine their models or for any other purposes, maintaining the highest confidentiality and integrity of user data.

Strict Data Retention Policies
Skill-related data is swiftly removed upon completion, and data from unfinished skills is deleted after 30 days, preventing data accumulation and potential vulnerabilities.

Two-Factor Authentication (2FA)
We enforce 2FA for all logins, serving as an extra security layer to protect user accounts from unauthorized access and potential breaches.

Advanced Anti-Automation Features
Our system employs sophisticated features to counteract external automation and secure against malicious bots and cyber threats.

Regular Security Assessments
Our annual security and penetration testing ensure our security measures are robust, up-to-date, and resilient against emerging threats by proactively addressing any vulnerabilities.

Nightly Security Code Analysis
Security analysis is performed on our code nightly, ensuring timely detection and resolution of any security issues and maintaining secure and reliable services.|

24/7/365 Security Operations Center (SOC)
Our company-wide endpoint protection is continually monitored by a 24/7/365 SOC, ensuring immediate response to any security alerts or issues and maintaining the integrity of our security posture.

Did this answer your question?