Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Security, Privacy, and Compliance Hub

At Konverso, trust is at the heart of everything we do. Here you can understand how we ensure the security, privacy, and compliance of our solutions. Whether you’re exploring our AI-driven technologies or are an existing partner, this hub offers transparency into our practices and the steps we take to protect your data and uphold the highest standards of integrity.

Here, you’ll find detailed information on:

  • Certifications: Our commitment to maintaining global industry certifications, ensuring the highest standards of security and privacy.

  • Policies: How we implement comprehensive measures to protect your data and maintain ethical business practices.

  • Subprocessors: The carefully selected third parties we work with, who meet rigorous security and privacy requirements to support our services.

Your trust drives our innovation. Let’s build the future securely—together.

📜 Certifications

At Konverso, our commitment to security, privacy, and operational excellence is validated by our SOC 2 Type II certification. This globally recognized standard demonstrates that we implement stringent controls to protect your data and maintain trust.

Logo

Certification Name

Status

OIP (5).jpg

SOC 2 Type II

Valid

👮‍♂️ Policies

At Konverso, our policies are more than guidelines—they are a testament to our commitment to protecting your data, maintaining compliance, and ensuring operational excellence. Each policy is designed to uphold the highest standards of security, privacy, and transparency, providing you with the confidence to partner with us in building innovative, AI-driven solutions.

Explore our key policies below to understand how we safeguard your interests and drive secure and ethical business practices.

Governance and Management

  1. Acceptable Use :

    View file
    nameAcceptable Use.pdf

    Define acceptable behavior and usage for users interacting with your systems.

  2. Corporate Ethics :

    View file
    nameCorporate Ethics.pdf

    Showcase your ethical framework for responsible business operations.

  3. Information Security :

    View file
    nameInformation Security.pdf

    Highlight overarching security principles to protect data integrity and confidentiality.

  4. Personnel Security :

    View file
    namePersonnel Security.pdf

    Explain how employee behavior and access are managed for secure operations.


Data Privacy and Compliance

  1. Privacy Policy for Websites :

    View file
    namePrivacy Policy for Websites.pdf

    Provide clarity on how user data is collected, processed, and protected.

  2. Data Retention and Disposal :

    View file
    nameData Retention and Disposal.pdf

    Explain retention timelines and secure disposal methods for sensitive information.

  3. Internal Audit :

    View file
    nameInternal Audit.pdf

    Show your commitment to regular reviews for compliance and operational improvements.

  4. Risk Assessment :

    View file
    nameRisk Assessment.pdf

    Demonstrate proactive risk identification and mitigation strategies.


Security Operations

  1. Incident Management :

    View file
    nameIncident Management.pdf

    Outline the steps to detect, respond to, and recover from security incidents.

  2. Backup and Restoration :

    View file
    nameBackup and Restoration.pdf

    Highlight measures for safeguarding data availability and recoverability.

  3. Change Management :

    View file
    nameChange Management.pdf

    Explain how changes to IT systems are planned, tracked, and implemented securely.


Technology and Infrastructure

  1. Access Control :

    View file
    nameAccess Control.pdf

    Define policies for managing user access to systems and data.

  2. Network Security :

    View file
    nameNetwork Security.pdf

    Describe measures to secure communications and data transmission.

  3. Server Security :

    View file
    nameServer Security.pdf

    Focus on securing physical and virtual server environments.

  4. Software Development :

    View file
    nameSoftware Development.pdf

    Ensure secure coding and development practices throughout the lifecycle.


🤝 Subprocessors

This section includes information about each subprocessor, their certifications, and their role in data processing.

image-20241127-100136.pngImage Removedimage-20241128-132400.pngImage Added

All the subprocessors listed above provide services on Konverso's behalf. Konverso ensures that each subprocessor complies with data protection and security standards, including the necessary certifications (ISO 27001, SOC2 Type 2), to guarantee the security and privacy of client data.

Please contact us for more information about any specific subprocessor or their role in data processing.

Contact Information

Konverso
98 Route de la Reine, 92100 Boulogne-Billancourt, France
📧 Email: contact@konverso.ai
📞 Phone: +33 (0)1 70 68 29 10