Security

The agents we build are hosted on the virtual infrastructure of providers such as                                                                        Amazon Web Services, Microsoft Azure or Google Cloud

These providers invest billions of dollars to ensure:

▪ All data is encrypted under the AES-256 standard at rest and under TLS 1.3 in motion
▪ Protection with next-generation anti-malware
▪ Data is hosted in centers that meet SOC 2 and ISO 27001 requirements
▪ All systems are subject to frequent penetration tests
▪ Disaster recovery with backup in different data centers

iAutomator does not store user data. Even so, it follows the most demanding cybersecurity standards in terms of encryption, access control and anti-malware protection

Privacy

We consider privacy to be a fundamental right and are committed to protecting your data and that of your customers, particularly personal data
iAutomator maintains a zero data retention policy, we do not retain any data beyond what is necessary for its purpose
Our agents could use data anonymization techniques in the most sensitive projects
We will never sell or transfer your or user data to third parties
Providers of artificial intelligence models have varying privacy policies.                                                                                                                       Our service includes advice that helps navigate these policies

Regulatory Compliance

Security and privacy by design allows us to strictly comply with applicable regulations in the European Union,                         these are the most exacting regulations on AI and privacy in the world
Our data processing agreements are established under the General Data Protection Regulation and the LOPDGDD

The risk assessment carried out with a view to the application of the EU Artificial Intelligence Act 2024 classifies the risk of our services as “low” or “minimal”

With these classifications, it is sufficient to explain the flow of data and provide links to documents explaining the operation of the foundational models used.