Data Security & Privacy Policy

We come from a strong background in the security domain, having worked extensively in the cyber security space. 
By leveraging our deep expertise and experience in cyber security, we are committed to delivering robust and secure solutions that protect our clients from emerging threats in the evolving digital landscape.

Information

While using our Site, we may ask you to provide us with certain personally identifiable information that can be used to contact or identify you. Personally identifiable information may include, but is not limited to your name (“Personal Information”).

Information we collect

We may collect various types of information from and about users of our Services, including:

  • Personal Information: We may collect personally identifiable information, such as your name, email address, postal address, phone number, and other similar information when you provide it to us voluntarily or when you interact with our Services.
  • Usage Data: We may collect information about how you use our Services, including your access times, browser types, and language preferences.
  • Device Information: We may collect information about the device you are using to access our Services, including the hardware model, operating system and version, unique device identifiers, and mobile network information.
  • Location Information: With your consent, we may collect information about your precise location if your device settings allow us to do so.

How we use your information

We may use the information we collect from you for various purposes, including:

  • To provide, maintain, and improve our Services.
  • To personalize your experience on our Services.
  • To respond to your comments, questions, and requests.
  • To send you technical notices, updates, security alerts, and support and administrative messages.
  • To communicate with you about products, services, promotions, events, and other news and information we think will be of interest to you.
  • To monitor and analyze usage patterns, trends, and activities in connection with our Services.

Security

Sonify AI employs advanced security measures to protect contact centers from risks associated with Large Language Models (LLMs). These measures include:

  • Data Encryption: All sensitive data is encrypted both in transit and at rest to prevent unauthorized access.
  • Access Control: Strict access control policies ensure that only authorized personnel can access sensitive information.
  • Anomaly Detection: SonifyAI uses sophisticated algorithms to detect and respond to unusual activity that may indicate a security threat.
  • Regular Security Audits: Regular security audits are conducted to identify and address potential vulnerabilities in the system.
  • Compliance with Regulations: SonifyAI adheres to industry standards and regulations, such as GDPR and CCPA, to ensure the highest level of data protection and privacy.
  • Continuous Monitoring: The system is continuously monitored for potential security threats, allowing for immediate response and mitigation.

Contributions

Our team’s contributions to the field includes our involvement in developing the OWASP Top 10 for Large Language Models (LLMs). This project aims to identify and address the most critical security risks associated with LLMs, providing guidelines and best practices to help organizations mitigate these risks effectively.

Privacy

Sonify AI is committed to protecting the privacy of our users. We ensure that:

  • User Consent Management: Users are provided with clear options to manage their consent for data collection and processing, ensuring transparency and control over personal information.
  • Minimization of Data Collection: We only collect data that is necessary for providing our services and enhancing user experience.
  • Data Retention Policies: Personal data is retained only for as long as necessary to fulfill the purposes for which it was collected, after which it is securely deleted or anonymized.
  • User Rights: Users have the right to access, correct, or delete their personal information, as well as to object to or restrict its processing.
  • Third-Party Sharing: Personal information is not shared with third parties without user consent, except as required by law or for the provision of our services.

Log data

In addition to the information mentioned above, we collect log data when you interact with our Services. This log data includes your computer’s IP address, browser type, browser version, the pages of our Services that you visit, the time and date of your visit, the time spent on those pages, and other statistics. This information is used for analyzing trends, administering the site, tracking users’ movements on the site, and gathering demographic information.

Cookies

Cookies are files with small amount of data, which may include an anonymous unique identifier. Cookies are sent to your browser from a web site and stored on your computer’s hard drive.

Our Services use cookies and similar technologies to enhance your experience. Cookies are small files placed on your computer, which allow us to recognize your browser and capture certain information. You can instruct your browser to refuse all cookies or to indicate when a cookie is being sent. However, if you do not accept cookies, you may not be able to use some portions of our Services.

Security

The security of your Personal Information is important to us, but remember that no method of transmission over the Internet, or method of electronic storage, is 100% secure. While we strive to use commercially acceptable means to protect your Personal Information, we cannot guarantee its absolute security.

We employ industry-standard security measures to safeguard your data from unauthorized access, alteration, disclosure, or destruction. Despite these efforts, please be aware that no method of transmission over the internet or electronic storage is 100% secure, and we cannot guarantee absolute security.

External links

Our Site may contain links to external sites that are not operated by us. Please be aware that we have no control over the content and practices of these sites and cannot accept responsibility or liability for their respective privacy policies. We encourage you to review the privacy policies of these external sites before providing them with any personal information.

Changes

This Privacy Policy will remain in effect except with respect to any changes in its provisions in the future, which will be in effect immediately after being posted on this page.

We reserve the right to update or change our Privacy Policy at any time, and you should check this Privacy Policy periodically. Your continued use of the Service after we post any modifications to the Privacy Policy on this page will constitute your acknowledgment of the modifications and your consent to abide and be bound by the modified Privacy Policy.

Contact us

If you have any questions about this Privacy Policy, please contact us.