Committed to Upholding User Data Protection
At inai, our customers’ trust is critical to us. Know that your information is in safe hands with inai. We adhere to the highest global standards, implementing a thorough approach to prioritize both data privacy and security.
Inai's Commitment to Security and Compliance
At inai, safeguarding customer data is at the core of what we do every day. We adhere to globally-recognized standards in data handling, follow best practices, and strictly comply with data transfer regulations. Our commitment to compliance is independently assessed by third-party auditors, ensuring that we meet the rigorous standards of GDPR, SCA, and maintain PCI Level 1 DSS compliance.
Robust PII data security.
Non-payment data: This is data that contains customer’s personal information including name, email address, phone number, and address. This is information that you can choose not to provide to inai via your payment vendors. In cases where the information is provided to your payment provider, and we receive it, we will not persist the same in our databases. When you enter the keys to connect with the payment service provider, we explicitly take your consent on whether you want us to capture your users’ non-payment data.
Protect data with secure hosting
We store all data in localized AWS instances and follow best practices to ensure data is protected. inai maintains fully compliant data centers that ensure sensitive data is stored securely. Additionally, inai encrypts data at rest so our customers can feel safe that their data is secure.
Restrict data access with internal controls
Even more important in today’s remote work environment are limits to accessing customer data. A number of capabilities are available to ensure data is only accessible by authorized users on your team. Security measures inai provides include: two-factor authentication, role-based access, and restricted IP access.
Focus on Data Security
Dedicated Infosec Team
At Inai, we maintain a dedicated information security Team that's available around the clock, every day of the year. They are on standby to respond swiftly to security alerts and incidents.
Protection Through Network Firewall
Our network benefits from a robust network-level firewalling system. This system provides a formidable defense against network attacks. We closely monitor and exercise tight control over firewall protections to ensure the security of our network.
To reinforce the security of our network, we rely on essential AWS security services, ongoing audits, and vigilant network IT supervision. These measures allow us to actively monitor and proactively thwart recognized malicious traffic and attacks.
External Penetration Testing
In addition to our comprehensive internal scanning and testing procedures, we regularly engage third-party assessments and audits, conducted multiple times each year. This practice enhances our security posture and validates its effectiveness. We effectively have an audit every single day.