Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

At Konverso, our commitment to security, privacy, and operational excellence is validated by our ISO 27001 and SOC 2 Type II certifications certification. These This globally recognized standards demonstrate standard demonstrates that we implement stringent controls to protect your data and maintain trust.

...

Logo

Certification Name

Status

OIP (5).jpgImage RemovedOIP (5).jpgImage Added

SOC 2 Type II

Valid

iso-27001-certified-badge-or-information-security-management-system-iso-27001-icon-rubber-stamp-seal-label-emblem-with-check-mark-glossy-and-golden-badge-illustration-vector.jpgImage RemovedISO 27001

Valid

👮‍♂️ Policies

At Konverso, our policies are more than guidelines—they are a testament to our commitment to protecting your data, maintaining compliance, and ensuring operational excellence. Each policy is designed to uphold the highest standards of security, privacy, and transparency, providing you with the confidence to partner with us in building innovative, AI-driven solutions.

...

  1. Acceptable Use :

    View file
    nameAcceptable Use.pdfpageSecurity, Privacy, and Compliance Hub Page

    Define acceptable behavior and usage for users interacting with your systems.

  2. Corporate Ethics :

    View file
    nameCorporate Ethics.pdfpageSecurity, Privacy, and Compliance Hub Page

    Showcase your ethical framework for responsible business operations.

  3. Information Security :

    View file
    nameInformation Security.pdfpageSecurity, Privacy, and Compliance Hub Page

    Highlight overarching security principles to protect data integrity and confidentiality.

  4. Personnel Security :

    View file
    namePersonnel Security.pdf
    pageSecurity, Privacy, and Compliance Hub Page

    Explain how employee behavior and access are managed for secure operations.

...

  1. Privacy Policy for Websites :

    View file
    namePrivacy Policy for Websites.pdfpageSecurity, Privacy, and Compliance Hub Page

    Provide clarity on how user data is collected, processed, and protected.

  2. Data Retention and Disposal :

    View file
    page
    nameData Retention and Disposal.pdfSecurity, Privacy, and Compliance Hub Page

    Explain retention timelines and secure disposal methods for sensitive information.

  3. Internal Audit :

    View file
    nameInternal Audit.pdfpageSecurity, Privacy, and Compliance Hub Page

    Show your commitment to regular reviews for compliance and operational improvements.

  4. Risk Assessment :

    View file
    nameRisk Assessment.pdf
    pageSecurity, Privacy, and Compliance Hub Page

    Demonstrate proactive risk identification and mitigation strategies.

...

  1. Incident Management :

    View file
    nameIncident Management.pdfpageSecurity, Privacy, and Compliance Hub Page

    Outline the steps to detect, respond to, and recover from security incidents.

  2. Backup and Restoration :

    View file
    nameBackup and Restoration.pdfpageSecurity, Privacy, and Compliance Hub Page

    Highlight measures for safeguarding data availability and recoverability.

  3. Change Management :

    View file
    nameChange Management.pdfpageSecurity, Privacy, and Compliance Hub Page

    Explain how changes to IT systems are planned, tracked, and implemented securely.

...

  1. Access Control :

    View file
    nameAccess Control.pdfpageSecurity, Privacy, and Compliance Hub Page

    Define policies for managing user access to systems and data.

  2. Network Security :

    View file
    nameNetwork Security.pdfpageSecurity, Privacy, and Compliance Hub Page

    Describe measures to secure communications and data transmission.

  3. Server Security :

    View file
    nameServer Security.pdf
    pageSecurity, Privacy, and Compliance Hub Page

    Focus on securing physical and virtual server environments.

  4. Software Development :

    View file
    nameSoftware Development.pdfpageSecurity, Privacy, and Compliance Hub Page

    Ensure secure coding and development practices throughout the lifecycle.

...

This section includes information about each subprocessor, their certifications, and their role in data processing.Image Removed

...

All the subprocessors listed above are used to provide services on Konverso's behalf of Konverso. Konverso ensures that each subprocessor complies with data protection and security standards, including the necessary certifications (ISO 27001, SOC2 Type 2), to guarantee the security and privacy of client data.

For Please contact us for more information about any specific subprocessor or their role in data processing, please contact us.

Contact Information

Konverso
95 avenue Balzac, 92410 Ville d'Avray98 Route de la Reine, 92100 Boulogne-Billancourt, France
📧 Email: contact@konverso.ai
📞 Phone: +33 (0)1 70 68 29 10