Security & Privacy
Safeguarding your data is integral to our engineering ethos.
Best-in-class data handling practices and rigorous security training define our standard of excellence.
Certifications
Meeting Global Standards with Proven Compliance
SOC 2 Type II
Adhering to the SOC 2 Type II framework, FreeText AI showcases its dedication to the highest standards of security and operational excellence.
This compliance underscores our commitment to maintaining strict controls and procedures in safeguarding customer data, with an emphasis on the five trust service principles: security, availability, integrity, confidentiality, and privacy.
This compliance underscores our commitment to maintaining strict controls and procedures in safeguarding customer data, with an emphasis on the five trust service principles: security, availability, integrity, confidentiality, and privacy.
GDPR
FreeText AI is fully compliant with the General Data Protection Regulation (GDPR), demonstrating our unwavering commitment to data privacy and protection.
We prioritize our users privacy rights, ensuring transparent data collection, processing and storage practices. Our GDPR compliance signifies our dedication to upholding the stringent privacy standards set by the European Union.
We prioritize our users privacy rights, ensuring transparent data collection, processing and storage practices. Our GDPR compliance signifies our dedication to upholding the stringent privacy standards set by the European Union.
ISO 27001:2022
FreeText AI proudly adheres to the stringent standards of ISO 27001:2022, ensuring a robust Information Security Management System (ISMS).
This certification demonstrates our unwavering commitment to managing and protecting data with the highest level of security, encompassing risk management, operational control, and continuous improvement processes.
This certification demonstrates our unwavering commitment to managing and protecting data with the highest level of security, encompassing risk management, operational control, and continuous improvement processes.
Inside Our Security Framework
Exploring the Layers of Our Comprehensive Security Measures
Advanced Data Security
All data is 256-bit AES encrypted at rest and 256-bit SSL/TLS encrypted in transit.
Databases are securely hosted in a Virtual Private Cloud with GCP, benefitting from rigorous backup and recovery protocols.
Customer data is stored and archived in isolation on dedicated disks.
Databases are securely hosted in a Virtual Private Cloud with GCP, benefitting from rigorous backup and recovery protocols.
Customer data is stored and archived in isolation on dedicated disks.
Role Based Access Controls
Data access is governed by stringent access control mechanisms.
We enforce strict access protocols to ensure that only authorized personnel can access user data or production environments.
Comprehensive audit logs are maintained for all access, providing a clear and accountable record of data interactions.
This meticulous approach ensures the integrity and confidentiality of sensitive information at all times.
We enforce strict access protocols to ensure that only authorized personnel can access user data or production environments.
Comprehensive audit logs are maintained for all access, providing a clear and accountable record of data interactions.
This meticulous approach ensures the integrity and confidentiality of sensitive information at all times.
Robust Account Safeguards
Enhanced account security with multi-factor authentication and strong password policies, safeguards user accounts against unauthorized access and potential security breaches.
Uptime and Fault Tolerance
Systems are engineered for high fault tolerance and maximum uptime.
Extensive security logging and monitoring are integral to these systems, consistently achieving system availability metrics.
This infrastructure ensures dependable service delivery, maintaining operational reliability at all times.
Extensive security logging and monitoring are integral to these systems, consistently achieving system availability metrics.
This infrastructure ensures dependable service delivery, maintaining operational reliability at all times.
Security Built Into Code
Access to critical code is restricted. Development, testing, and production environments are separated.
All code changes are peer reviewed and tested prior to deployment into production.
All code changes are peer reviewed and tested prior to deployment into production.
Third Party Audits
In addition to extensive internal scanning and testing, third-party security experts perform comprehensive security audits, encompassing penetration testing and vulnerability assessments.
Privacy at the core of AI
Privacy is baked into every phase of our AI training, development and deployment processes.
Training
- Secure, isolated training environments
- Fine-tuning with minimal, essential data
Inference
- Rigorous data scrubbing, anonymization
- Encrypted model operations, storage
Deployment
- Dedicated model deployment to prevent leaks
- On-premise deployment options
Oversight
- Contractual data use safeguards
- Regular audits and privacy upgrades
Frequently Asked Questions
Turn Data to Insights - Securely!
Unlock AI-powered insights with the assurance of top-tier data privacy.