...
Security, Privacy, and Compliance Hub
At Konverso, trust is at the heart of everything we are committed to maintaining transparency with our clients and ensuring data protection. In line with this commitment, we present the following list of subprocessors we use to process data on our behalf.This page do. Here you can understand how we ensure the security, privacy, and compliance of our solutions. Whether you’re exploring our AI-driven technologies or are an existing partner, this hub offers transparency into our practices and the steps we take to protect your data and uphold the highest standards of integrity.
Here, you’ll find detailed information on:
Certifications: Our commitment to maintaining global industry certifications, ensuring the highest standards of security and privacy.
Policies: How we implement comprehensive measures to protect your data and maintain ethical business practices.
Subprocessors: The carefully selected third parties we work with, who meet rigorous security and privacy requirements to support our services.
Your trust drives our innovation. Let’s build the future securely—together.
📜 Certifications
At Konverso, our commitment to security, privacy, and operational excellence is validated by our ISO 27001 and SOC 2 Type II certifications. These globally recognized standards demonstrate that we implement stringent controls to protect your data and maintain trust.
Logo | Certification Name | Status |
---|---|---|
SOC 2 Type II | ✅ Valid | |
ISO 27001 | ✅ Valid |
👮♂️ Policies
At Konverso, our policies are more than guidelines—they are a testament to our commitment to protecting your data, maintaining compliance, and ensuring operational excellence. Each policy is designed to uphold the highest standards of security, privacy, and transparency, providing you with the confidence to partner with us in building innovative, AI-driven solutions.
Explore our key policies below to understand how we safeguard your interests and drive secure and ethical business practices.
Governance and Management
Acceptable Use :
View file name Acceptable Use.pdf page Security, Privacy, and Compliance Hub Page
Define acceptable behavior and usage for users interacting with your systems.Corporate Ethics :
View file name Corporate Ethics.pdf page Security, Privacy, and Compliance Hub Page
Showcase your ethical framework for responsible business operations.Information Security :
View file name Information Security.pdf page Security, Privacy, and Compliance Hub Page
Highlight overarching security principles to protect data integrity and confidentiality.Personnel Security :
View file name Personnel Security.pdf page Security, Privacy, and Compliance Hub Page
Explain how employee behavior and access are managed for secure operations.
...
Data Privacy and Compliance
Privacy Policy for Websites :
View file name Privacy Policy for Websites.pdf page Security, Privacy, and Compliance Hub Page
Provide clarity on how user data is collected, processed, and protected.Data Retention and Disposal :
View file name Data Retention and Disposal.pdf page Security, Privacy, and Compliance Hub Page
Explain retention timelines and secure disposal methods for sensitive information.Internal Audit :
View file name Internal Audit.pdf page Security, Privacy, and Compliance Hub Page
Show your commitment to regular reviews for compliance and operational improvements.Risk Assessment :
View file name Risk Assessment.pdf page Security, Privacy, and Compliance Hub Page
Demonstrate proactive risk identification and mitigation strategies.
...
Security Operations
Incident Management :
View file name Incident Management.pdf page Security, Privacy, and Compliance Hub Page
Outline the steps to detect, respond to, and recover from security incidents.Backup and Restoration :
View file name Backup and Restoration.pdf page Security, Privacy, and Compliance Hub Page
Highlight measures for safeguarding data availability and recoverability.Change Management :
View file name Change Management.pdf page Security, Privacy, and Compliance Hub Page
Explain how changes to IT systems are planned, tracked, and implemented securely.
...
Technology and Infrastructure
Access Control :
View file name Access Control.pdf page Security, Privacy, and Compliance Hub Page
Define policies for managing user access to systems and data.Network Security :
View file name Network Security.pdf page Security, Privacy, and Compliance Hub Page
Describe measures to secure communications and data transmission.Server Security :
View file name Server Security.pdf page Security, Privacy, and Compliance Hub Page
Focus on securing physical and virtual server environments.Software Development :
View file name Software Development.pdf page Security, Privacy, and Compliance Hub Page
Ensure secure coding and development practices throughout the lifecycle.
...
🤝 Subprocessors
This section includes information about each subprocessor, their certifications, and their role in data processing.
All the subprocessors listed above are used to provide services on behalf of Konverso. Konverso ensures that each subprocessor complies with data protection and security standards, including the necessary certifications (ISO 27001, SOC2 Type 2), to guarantee the security and privacy of client data.
For more information about any specific subprocessor or their role in data processing, please contact us.
Contact Information
...
Konverso
95 avenue Balzac, 92410 Ville d'Avray, France
📧 Email: contact@konverso.ai
📞 Phone: +33 (0)1 70 68 29 10