Skip links

Prioritizing Your Trust: [24]7.ai Trust Center

At [24]7.ai, we prioritize the security and privacy of your data. This section details our commitment to data privacy, from compliance with regulations to ongoing improvement. Learn more about how we safeguard your information across our website, platform, and various data privacy laws.

Website Privacy

[24]7.ai respects your privacy and protects any personal information you provide on this website. This includes data like your name, email address, and anything that could identify you. We use reasonable safeguards to keep your information secure and only use it for legitimate business purposes. We never sell your personal information. Read More

Platform Privacy

[24]7.ai protects your privacy on provide software platforms, applications, and data analysis systems (collectively, the “[24]7.ai Platform”). We collect and process End User’s information which may include Personal Information and browsing information to with permission to provide clients with relevant product information, assistance in completing transactions and resolving customer services issues. We never sell your information and follow strict security standards. For control over your data, contact the website you visited. Read More

CCPA

California residents have rights under the CCPA to access, delete, and opt-out of the sale of their personal data. We collect data like name and email to provide services and support. We share this data with service providers under strict contracts that protect your privacy. Visit our CCPA page to learn more and submit requests. Read More

GDPR

[24]7.ai protects your privacy under the EU’s GDPR law. We use minimal personal data (like IP address) to help clients improve customer experiences. We follow strict security standards and give you control over your information. Contact us to learn more about your GDPR rights. Read More

[24]7 Connect Privacy

The [24]7.ai Connect app provides notifications and self-service options for employees and approved non-employees. We collect some personal data (like email address) to run the app and keep your information secure. This data is used only for authorized purposes within [24]7.ai. You can opt-out by uninstalling the app. Contact us with any privacy questions. Read More

We conduct internal evaluations of security, privacy, risk, and security posture against the following frameworks:

  • National Institute of Standards and Technology (NIST) SP 800-53 Revision 4/Revision 5, Security and Privacy Controls for Information Systems and Organizations (NIST 800-53): This framework provides a systematic approach for a broad range of public and private sector organizations to implement a comprehensive set of security and privacy safeguards. These measures apply to all types of computing platforms, including cyber-physical systems, mobile and cloud systems, general-purpose computing systems, industrial/process control systems, and Internet of Things (IoT) devices.
  • NIST Cybersecurity Framework (CSF) Version 1.1: Initially developed for industries critical to national and economic security, the NIST CSF has proven to be flexible and adaptable. It is now voluntarily adopted by large and small companies and organizations across all sectors, as well as by federal, state, and local governments.

At [24]7.ai, security isn’t an afterthought, it’s ingrained in everything we do. We understand the critical nature of your data and digital experiences, and we’re committed to safeguarding them with the most robust measures available.

Product Security

We follow Shift-Left Security Methodology where security validations are introduced in early stages of Software Development Life-Cycle(SDLC). Our development teams are constantly trained and equipped with the latest secure coding practices to build robust and reliable products. Products go through Architecture review, Threat modelling, Peer-review, Static Application Security Testing(SAST) and Dynamic Application Security Testing(DAST) which ensures security vulnerabilities are addressed in every stage of product development. This multi-layered approach ensures the security of your data is prioritized at every stage.

Data Security

We maintain secure and redundant backups of your data for complete availability and recoverability. Your data always remains protected, both in storage (at rest) and during transmission (in transit).

Application Security

We follow Secure Application Development and Deployment Standard that prioritizes security throughout the development process. Static Code analysis tools are configured to continuously scan for and address potential security issues within our applications. Each application undergoes through Vulnerability Assessment and Penetration Testing(VA/PT) before applications are made available on production.

Network Security

We leverage a secure Virtual Private Cloud (VPC) environment to isolate and protect your data within our network. Advanced systems (IDS/IPS) constantly monitor our network for suspicious activity, safeguarding against potential threats. Network security firewalls act as a rigorous first line of defence, filtering and monitoring all traffic entering and leaving our systems.

Access Control

We implement robust access controls to ensure only authorized personnel can access specific data based on their roles (need to know basis). Comprehensive logs track all user interactions and data access attempts.

Enterprise Security

Our rigorous internal audit program continuously evaluates and improves the effectiveness of our security controls. We prioritize employee awareness through regular security training programs. Thorough security background checks are conducted on all employees during the hiring process.

At [24]7.ai, we take data privacy and security very seriously. That’s why we adhere to the highest industry standards and regulations, including HIPAA, PCI DSS, ISO 27001 and AICPA. These rigorous frameworks ensure your data is protected according to strict compliance guidelines. Additionally, we undergo independent audits to verify our adherence to these standards, providing you with an extra layer of assurance.

PCI DSS

We adhere and follow the PCI DSS standard to secure credit card information. This industry-wide standard applies to any business that handles cardholder data. We offer resources to help our customers comply with PCI DSS requirements.

Read More

AICPA SOC 2

[24]7.ai SOC 2 compliance is verified by independent third-party auditors, which ensures we have met the criteria for managing customer data based on five AICPA Trust Service Principles and Criteria: Security, Availability, Processing Integrity, Confidentiality and Privacy.

Read More

ISO 27001

We hold ISO/IEC 27001:2013 certification, a rigorous international security standard. This ensures we systematically manage information security risks, implement robust controls, and have a continuous improvement process – all verified by independent auditors.

Read More

HIPPA

We are compliant with Health Insurance Portability and Accountability Act (HIPAA). We ensure our compliance with all HIPAA Rules (Privacy, Security, and Breach Notification) and adhere to the regulated Administrative, Physical, and Technical Safeguards.

Read More
At [24]7.ai, trust is paramount. We prioritize responsible AI deployments and secure your data with advanced encryption, access controls, and clear usage guidelines. You own and control your data, and we empower you to manage it.

Data Privacy and Protection

Your data is in safe hands. We prioritize data privacy and take comprehensive measures to ensure it is always treated with the utmost care.

Data Encryption

All data transmitted, stored and processed within [24]7.ai applications and environments, including interactions with LLMs, is encrypted using state-of-the-art encryption methods and protocols. This ensures that the data of our clients remains confidential and secure during transit, while at rest, and in use.

Granular Access Controls

We implement stringent access controls such as RBAC (Role Based Access Controls), allowing only authorized personnel to access specific datasets with least privilege and need-to-know security principles. This ensures that individuals of [24]7.ai and/or clients/partners have access only to the data necessary for their roles, minimizing the risk of unauthorized exposure.

Purpose-Limited Data Usage

We are committed to using the data of our clients solely for the purposes explicitly defined in our agreements. At [24]7.ai our systems are designed to process and leverage data only in ways that align with the intended functionalities and benefits outlined in our solutions.

Data Ownership and Control

You, retain ownership and control over the data you share with us. [24]7.ai, as data processor, would be able to help in meeting various data privacy and compliance norms such as CCPA, GDPR, Privacy Shield, and APEC CBPR. Our privacy program is assessed annually by a third-party assessor.

Security

Security is the foundation of everything we do. We continuously adapt our industry- leading measures to safeguard the integrity of your data.

Data Security Audits and Assessments

We follow a proactive approach in conducting regular security audits and assessments to identify and address potential vulnerabilities in our systems. This allows us to stay ahead of evolving security threats and continuously fortify our defences.

Audits

We adhere to the highest industry standards and regulations. We undergo independent audits to verify our adherence to standards like PCI, HIPPA, ISO, and SOC2

Vendor Management and Assessments

At [24]7.ai our third-party vendors, including LLM providers undergo thorough assessments to ensure they adhere to our stringent security and privacy standards. This diligence extends to every entity involved in the [24]7.ai’s product ecosystem.

Incident Response Preparedness

Our incident response methods arerobust and well-defined. In the unlikely event of a security incident, our team is prepared to respond promptly, efficiently, and in accordance with industry best- practices to minimize any potential impact.

Regular Security Training

At [24]7.ai our personnel are continuously trained on the latest security practices and are well-versed in identifying and addressing potential security risks. This commitment extends to all job levels of our organization, ensuring a culture of security awareness.

Continuous Monitoring and Threat Detection

Our systems undergo continuous monitoring by the Security Operations Center team. Threat detection mechanisms are in place to promptly identify and mitigate any suspicious activities. This proactive stance enables us to address and respond to potential security incidents in real-time.

Safety of the LLM

Your privacy and safety are our top priorities. We do not use your data for training purposes, and your interactions with our LLMs remain confidential. Our automated systems continuously evaluate prompts and responses against our strict content policy, filtering out high-severity content to ensure a safe and responsible AI experience.

Frequently Asked Questions

When providing services to a customer, [24]7.ai may transfer personal data outside of EEA, Switzerland and UK in its capacity as processor. The General Data Protection Regulation (GDPR) has been incorporated into UK’s domestic legislation, and therefore the data transfer mechanism permitted under the GDPR for transfers of personal data.
When providing services to a customer, [24]7.ai may transfer personal data outside of EEA, Switzerland and UK in its capacity as processor. The General Data Protection Regulation (GDPR) has been incorporated into UK’s domestic legislation, and therefore the data transfer mechanism permitted under the GDPR for transfers of personal data.
When providing services to a customer, [24]7.ai may transfer personal data outside of EEA, Switzerland and UK in its capacity as processor. The General Data Protection Regulation (GDPR) has been incorporated into UK’s domestic legislation, and therefore the data transfer mechanism permitted under the GDPR for transfers of personal data.
When providing services to a customer, [24]7.ai may transfer personal data outside of EEA, Switzerland and UK in its capacity as processor. The General Data Protection Regulation (GDPR) has been incorporated into UK’s domestic legislation, and therefore the data transfer mechanism permitted under the GDPR for transfers of personal data.
When providing services to a customer, [24]7.ai may transfer personal data outside of EEA, Switzerland and UK in its capacity as processor. The General Data Protection Regulation (GDPR) has been incorporated into UK’s domestic legislation, and therefore the data transfer mechanism permitted under the GDPR for transfers of personal data.

Let’s Craft the Future of CX Together