-
Rigorous Controls: Our security controls have been designed and tested by certified auditors
-
Industry Standards: We meet or exceed enterprise security requirements
-
Continuous Monitoring: Our security posture is regularly evaluated and improved
-
Transparent Reporting: We provide detailed security documentation to enterprise clients
We process and store personal data strictly in line with General Data Protection Regulation requirements, with clear rights for individuals and documented legal bases for use.
-
Lawful Processing: All personal data is processed lawfully, fairly, and transparently with documented legal bases
-
Purpose Limitation: Data is collected for specified, explicit purposes and not further processed in incompatible ways
-
Individual Rights: Full support for access, rectification, erasure, portability, and objection rights
-
Data Protection by Design: Privacy considerations are integrated into all products and processes from the outset
The Personal Information Protection and Electronic Documents Act (PIPEDA) is Canada's federal privacy law. PIPEDA compliance guides our approach to personal data, with accountability, transparency, and meaningful consent at the core.
-
Accountability: We are responsible for personal information under our control and have designated individuals accountable for compliance
-
Meaningful Consent: We obtain knowledge and consent for the collection, use, or disclosure of personal information
-
Limiting Collection: Collection is limited to what is necessary for identified purposes and obtained by fair and lawful means
-
Individual Access: Individuals can request access to their personal information and challenge its accuracy and completeness
Data Protection & Privacy
Your Data Stays Yours
-
Never Used for Training: Unlike some AI platforms, your data is never used to train our models
-
ZDR: Implement Zero Data Retentions with Google Gemini and Anthropic Claude
-
Encryption Everywhere: All data is encrypted at rest (AES 256-bit) and in transit (TLS/SSH)
-
Data Residency: Your data is stored in secure, compliant data centers in Canada and the US
Privacy by Design
-
Minimal Data Collection: We only collect what's necessary to provide our services
-
User Control: You have full control over your data with rights to access, correct, or delete
-
No Tracking: We don't track your personal information for advertising or other purposes
-
Confidentiality Agreements: All our team members sign strict confidentiality agreements
Enterprise-Grade Architecture
-
Microsoft Azure: Built on Azure's secure cloud infrastructure with multi-region redundancy
-
Multi-Factor Authentication: Required for all system access
-
Role-Based Access Control: Strict permissions ensure users only access what they need
-
Network Security: Advanced firewalls and intrusion detection systems protect against threats
Continuous Monitoring
-
24/7 Security Monitoring: Automated systems watch for suspicious activity around the clock
-
Vulnerability Management: Regular security scans and prompt patching of any issues
-
Incident Response: Documented procedures for rapid response to any security events
-
Backup & Recovery: Automated backups with tested disaster recovery procedures
Regulatory Alignment
-
Privacy Regulations: Compliant with applicable privacy laws and regulations
-
Regular Audits: Annual security assessments and continuous improvement processes
-
Risk Management: Formal risk assessment and mitigation programs
Transparency & Accountability
-
Security Documentation: Detailed security policies and procedures
-
Incident Reporting: Clear processes for reporting and addressing security concerns
-
Regular Updates: Ongoing communication about security improvements and changes
While we handle the heavy lifting, security is a shared responsibility:
Best Practices for Users
-
Strong Passwords: Use strong, unique passwords for your Agentiiv account
-
No Credential Sharing: Don't share your login credentials with others
-
Report Suspicious Activity: Report any suspicious activity immediately
-
Stay Updated: Keep your devices and browsers updated
Enterprise Clients
-
SSO Available: SSO is available if needed
-
Usage Reporting: Reporting is available to monitor usage within your organization
-
Security Notifications: Notify us of any security incidents or concerns