Last Updated: January 8, 2025
THIS PRIVACY POLICY DESCRIBES HOW AEGISAI ("COMPANY," "WE," "US," OR "OUR") COLLECTS, USES, STORES, PROCESSES, AND PROTECTS YOUR INFORMATION WHEN YOU USE OUR EMAIL SECURITY AND THREAT DETECTION SERVICES.
At AegisAI, we understand that the security and privacy of your email communications are of paramount importance. Our service is designed to provide robust threat detection while maintaining the highest standards of data privacy and protection. We have developed sophisticated scanning technologies that analyze email content for security threats while implementing stringent privacy controls to ensure that your sensitive information remains confidential and protected.
This Privacy Policy outlines our comprehensive approach to handling your data, with a specific emphasis on our unique email scanning and threat detection capabilities. We have carefully designed our systems to maintain a balance between effective security monitoring and privacy preservation, ensuring that only suspicious content is retained while maintaining the confidentiality of your regular business communications.
Through this policy, we aim to provide complete transparency about our data handling practices, enabling you to make informed decisions about your use of our services. We are committed to maintaining your trust through clear communication about our privacy practices and ongoing dedication to protecting your information.
Our advanced email scanning system processes various components of your email communications to ensure comprehensive threat detection while maintaining privacy. The scanning process is automated and designed to minimize human intervention, operating in real-time to identify and isolate potential threats while allowing legitimate communications to flow unimpeded.
During this process, we collect and analyze:
Our scanning process is designed to be minimally invasive, focusing solely on security-relevant aspects of your communications. Regular, non-suspicious email content is processed in memory only and is not permanently stored in our systems.
To maintain optimal security and system performance, our service automatically collects certain technical information about the systems and networks interacting with our service. This data collection is essential for maintaining security baselines and detecting potential anomalies that could indicate security threats.
We systematically collect:
This technical data is collected and processed in a manner that prioritizes security while respecting privacy, with strict controls on data retention and access.
To provide our services effectively and maintain appropriate security controls, we collect and maintain certain account-related information. This information is essential for account management, authentication, and securing access to our services.
When you register and maintain an account with us, we collect:
All account information is stored securely with strict access controls and is never shared with unauthorized parties.
Our core service utilizes advanced automated systems to provide comprehensive email security while maintaining strict privacy controls. These systems are designed to identify and protect against a wide range of email-based threats while minimizing exposure of sensitive information.
Our automated systems perform the following functions:
These processes are fully automated and operate with minimal human intervention, ensuring that your email content remains private while maintaining robust security protection.
Data from Google Workspace APIs is not used to develop, improve, or train generalized AI and/or ML models.
We implement stringent data retention practices designed to minimize data storage while maintaining effective threat protection. Our approach focuses on retaining only the information necessary for security purposes while promptly disposing of non-essential data.
Key aspects of our retention practices include:
To continuously enhance our security capabilities, we conduct analysis using aggregated and anonymized data. This process is designed to improve our threat detection capabilities while maintaining strict privacy controls.
We utilize this data to:
We employ a comprehensive, defense-in-depth approach to protecting your data. Our security infrastructure is designed with multiple layers of protection, implementing industry-leading security controls and best practices at every level.
Our security implementation includes:
Our sophisticated DLP system forms a crucial component of our data protection strategy. It employs advanced technologies to prevent unauthorized data access or exfiltration while maintaining efficient service operation.
The DLP system features:
We maintain strict access controls to ensure that your data is only accessible to authorized personnel and systems. Our access control framework is built on the principle of least privilege and includes comprehensive monitoring and audit capabilities.
Key access control measures include:
We maintain a strict policy against sharing your data with third parties. Your email content and personal information are considered confidential and are protected accordingly. Our commitment to privacy means that we do not monetize your data or share it for marketing purposes.
Our non-sharing commitments include:
While we maintain strict data privacy, there are certain limited circumstances under which we may be required to disclose information. These circumstances are strictly limited and subject to internal review processes.
Disclosure may occur only when:
We carefully select and monitor any service providers who may have access to our systems. These providers are bound by strict contractual obligations and are regularly audited for compliance.
Our service provider requirements include:
We empower users with comprehensive control over their data through various tools and mechanisms. These controls are designed to be user-friendly while maintaining robust security.
Your data control rights include:
We provide flexible options for managing how your data is retained within our systems. These preferences can be customized to meet your specific security and privacy requirements.
Available retention controls include:
In cases where our services involve international data transfers, we implement comprehensive safeguards to ensure the security and privacy of your data. Our international data handling practices are designed to comply with relevant regulations while maintaining efficient service delivery.
For international transfers, we maintain:
Our international data transfer protocols include detailed monitoring and verification processes to ensure consistent protection of your data regardless of geographic location. We regularly review and update these measures to address evolving international privacy requirements and security standards.