Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 6 Next »

Security, Privacy, and Compliance Hub

At Konverso, trust is at the heart of everything we do. Here you can understand how we ensure the security, privacy, and compliance of our solutions. Whether you’re exploring our AI-driven technologies or are an existing partner, this hub offers transparency into our practices and the steps we take to protect your data and uphold the highest standards of integrity.

Here, you’ll find detailed information on:

  • Certifications: Our commitment to maintaining global industry certifications, ensuring the highest standards of security and privacy.

  • Policies: How we implement comprehensive measures to protect your data and maintain ethical business practices.

  • Subprocessors: The carefully selected third parties we work with, who meet rigorous security and privacy requirements to support our services.

Your trust drives our innovation. Let’s build the future securely—together.

📜 Certifications

At Konverso, our commitment to security, privacy, and operational excellence is validated by our ISO 27001 and SOC 2 Type II certifications. These globally recognized standards demonstrate that we implement stringent controls to protect your data and maintain trust.

Logo

Certification Name

Status

OIP (5).jpg

SOC 2 Type II

Valid

iso-27001-certified-badge-or-information-security-management-system-iso-27001-icon-rubber-stamp-seal-label-emblem-with-check-mark-glossy-and-golden-badge-illustration-vector.jpg

ISO 27001

Valid

👮‍♂️ Policies

At Konverso, our policies are more than guidelines—they are a testament to our commitment to protecting your data, maintaining compliance, and ensuring operational excellence. Each policy is designed to uphold the highest standards of security, privacy, and transparency, providing you with the confidence to partner with us in building innovative, AI-driven solutions.

Explore our key policies below to understand how we safeguard your interests and drive secure and ethical business practices.

Governance and Management

  1. Acceptable Use :
    Define acceptable behavior and usage for users interacting with your systems.

  2. Corporate Ethics :
    Showcase your ethical framework for responsible business operations.

  3. Information Security :
    Highlight overarching security principles to protect data integrity and confidentiality.

  4. Personnel Security :
    Explain how employee behavior and access are managed for secure operations.


Data Privacy and Compliance

  1. Privacy Policy for Websites :
    Provide clarity on how user data is collected, processed, and protected.

  2. Data Retention and Disposal :
    Explain retention timelines and secure disposal methods for sensitive information.

  3. Internal Audit :
    Show your commitment to regular reviews for compliance and operational improvements.

  4. Risk Assessment :
    Demonstrate proactive risk identification and mitigation strategies.


Security Operations

  1. Incident Management :
    Outline the steps to detect, respond to, and recover from security incidents.

  2. Backup and Restoration :
    Highlight measures for safeguarding data availability and recoverability.

  3. Change Management :
    Explain how changes to IT systems are planned, tracked, and implemented securely.


Technology and Infrastructure

  1. Access Control :
    Define policies for managing user access to systems and data.

  2. Network Security :
    Describe measures to secure communications and data transmission.

  3. Server Security :
    Focus on securing physical and virtual server environments.

  4. Software Development :
    Ensure secure coding and development practices throughout the lifecycle.


🤝 Subprocessors

This section includes information about each subprocessor, their certifications, and their role in data processing.

All the subprocessors listed above are used to provide services on behalf of Konverso. Konverso ensures that each subprocessor complies with data protection and security standards, including the necessary certifications (ISO 27001, SOC2 Type 2), to guarantee the security and privacy of client data.

For more information about any specific subprocessor or their role in data processing, please contact us.

Contact Information

Konverso
95 avenue Balzac, 92410 Ville d'Avray, France
📧 Email: contact@konverso.ai
📞 Phone: +33 (0)1 70 68 29 10

  • No labels