Rigorous Controls: Our security controls have been designed and tested by certified auditors
Industry Standards: We meet or exceed enterprise security requirements
Continuous Monitoring: Our security posture is regularly evaluated and improved
Transparent Reporting: We provide detailed security documentation to enterprise clients
We process and store personal data strictly in line with General Data Protection Regulation requirements, with clear rights for individuals and documented legal bases for use.
Lawful Processing: All personal data is processed lawfully, fairly, and transparently with documented legal bases
Purpose Limitation: Data is collected for specified, explicit purposes and not further processed in incompatible ways
Individual Rights: Full support for access, rectification, erasure, portability, and objection rights
Data Protection by Design: Privacy considerations are integrated into all products and processes from the outset
The Personal Information Protection and Electronic Documents Act (PIPEDA) is Canada's federal privacy law. PIPEDA compliance guides our approach to personal data, with accountability, transparency, and meaningful consent at the core.
Accountability: We are responsible for personal information under our control and have designated individuals accountable for compliance
Meaningful Consent: We obtain knowledge and consent for the collection, use, or disclosure of personal information
Limiting Collection: Collection is limited to what is necessary for identified purposes and obtained by fair and lawful means
Individual Access: Individuals can request access to their personal information and challenge its accuracy and completeness
Data Protection & Privacy
Your Data Stays Yours
Never Used for Training: Unlike some AI platforms, your data is never used to train our models
ZDR: Implement Zero Data Retentions with Google Gemini and Anthropic Claude
Encryption Everywhere: All data is encrypted at rest (AES 256-bit) and in transit (TLS/SSH)
Data Residency: Your data is stored in secure, compliant data centers in Canada and the US
Privacy by Design
Minimal Data Collection: We only collect what's necessary to provide our services
User Control: You have full control over your data with rights to access, correct, or delete
No Tracking: We don't track your personal information for advertising or other purposes
Confidentiality Agreements: All our team members sign strict confidentiality agreements
Enterprise-Grade Architecture
Microsoft Azure: Built on Azure's secure cloud infrastructure with multi-region redundancy
Multi-Factor Authentication: Required for all system access
Role-Based Access Control: Strict permissions ensure users only access what they need
Network Security: Advanced firewalls and intrusion detection systems protect against threats
Continuous Monitoring
24/7 Security Monitoring: Automated systems watch for suspicious activity around the clock
Vulnerability Management: Regular security scans and prompt patching of any issues
Incident Response: Documented procedures for rapid response to any security events
Backup & Recovery: Automated backups with tested disaster recovery procedures
Regulatory Alignment
Privacy Regulations: Compliant with applicable privacy laws and regulations
Regular Audits: Annual security assessments and continuous improvement processes
Risk Management: Formal risk assessment and mitigation programs
Transparency & Accountability
Security Documentation: Detailed security policies and procedures
Incident Reporting: Clear processes for reporting and addressing security concerns
Regular Updates: Ongoing communication about security improvements and changes
While we handle the heavy lifting, security is a shared responsibility:
Best Practices for Users
Strong Passwords: Use strong, unique passwords for your Agentiiv account
No Credential Sharing: Don't share your login credentials with others
Report Suspicious Activity: Report any suspicious activity immediately
Stay Updated: Keep your devices and browsers updated
Enterprise Clients
SSO Available: SSO is available if needed
Usage Reporting: Reporting is available to monitor usage within your organization
Security Notifications: Notify us of any security incidents or concerns