💥🚀 Now accepting early access partners. Join the waitlist to be among the first institutions using AIDO at preferred pricing.

Data Security

At AIDO we take data security and privacy very seriously. Our commitment is to ensure that all data handled by AIDO is protected with the highest standards of security. Here’s how we ensure your data remains secure and private:

Cloud Storage

We utilize Amazon Web Services (AWS) for most of our data storage and backup needs. AWS is a leading provider in cloud security, offering robust infrastructure and advanced security features, including:

  • Data Encryption: All data stored in AWS is encrypted both at rest and in transit using industry-standard encryption protocols.
  • Access Control: Strict access control policies are enforced to ensure that only authorized personnel have access to data.
  • Regular Audits: AWS undergoes regular security audits to ensure compliance with global standards.
  • Backup Management: AWS Backup provides a unified interface to manage and automate backups across AWS services.
Vector Database Cloud Storage

We also utilize a cloud-based vector database for all our unstructured data. Which offers a robust infrastructure and advanced security features, including:

  • Data Encryption: TLS encryption is used to secure data communication over networks. This ensures that data transmitted between the client and the database is encrypted, protecting it from interception and tampering.
  • Access Control: Strict access control policies are enforced to ensure that only authorized personnel have access to data.
  • Regular Audits: Our cloud-based managed database undergoes regular security audits to ensure compliance with industry standards.
Virtual Private Server (VPS)

Our application code is hosted on a Virtual Private Server (VPS), providing a secure and isolated environment for running our services. The VPS ensures:

  • Dedicated Resources: Our VPS provides dedicated resources, ensuring optimal performance and security.
  • Firewall Protection: Advanced firewall protection is implemented to safeguard against unauthorized access.
  • Regular Updates: We perform regular updates and security patches to keep the server protected against vulnerabilities.
LLM Technologies

From an LLM perspective:

  • Data Privacy: We do not ask for or store any PPI data. All data processed through the latest LLM technologies is anonymized to protect users’ data.
  • Secure API Calls: All API calls are secured using HTTPS to ensure data integrity and confidentiality during transmission.
Anonymized Data Handling

We ensure that all data handled by our AI chatbot is fully anonymized. This means:

  • No Personalized Information: We do not collect or store any personally identifiable information (PII) from users.
  • Data Anonymization: Any data that is processed is stripped of any identifying details, ensuring complete anonymity.
  • Usage Analytics: We use anonymized data solely for the purpose of improving
No Live Chat Data Used for Model Training

To ensure the integrity and security of all data, we do not use live chat interactions to train our models. This means:

  • Data Integrity: Your interactions with our chatbot are not used to improve or alter the AI model, ensuring all the data remains confidential.
  • User Trust: By not using live chat data for training, we maintain a clear boundary between user interactions and model development, fostering trust and transparency and accurate data
Client Users
  • Role-Based Access: Each client user is assigned a role with specific access privileges. This ensures that users can only interact with features and data necessary for their designated tasks, protecting sensitive information and minimizing the risk of unauthorized access.
  • Multi-Factor Authentication (MFA): To add an extra layer of security, MFA is required for client users to access their accounts. This helps prevent unauthorized logins and ensures that accounts remain secure, even if credentials are compromised.
  • User Activity Monitoring: Client user activities are monitored for anomalies, which enhances security and helps identify any unauthorized or suspicious actions.
Internal Users
  • Tiered Access Levels: Staff users are assigned different levels of access based on their role within the organization. This ranges from basic access for general tasks to administrative access for high-level operations and data management.
  • Granular Permissions: Permissions are customized to align with specific job functions, ensuring staff members can only access the systems and data necessary for their duties.
  • Multi-Factor Authentication (MFA): MFA is enforced for all staff users to provide an additional layer of protection against unauthorized access. This is critical in maintaining the integrity of our data and operational processes.
Your Trust, Our Priority

We understand the importance of trust when it comes to handling your data. Our commitment to security and privacy is unwavering, and we continuously strive to implement the best practices to protect your information. Concerns or questions please email hello@meetaido.com