data & security

Ensuring Comprehensive Protection and Reliability

At Letter AI, we respect and protect your privacy with industry-leading security infrastructure, responsible data practices, and easy-to-use privacy tools that put you in control.

about our security practices

At Letter AI, security and privacy are top-of-mind for us. When you decide to partner with us, you not only receive access to the world-class revenue enablement platform powered natively by AI - you also receive best-in-class privacy and security guarantees.

This page highlights the many ways in which we safeguard Letter AI's platform, ensuring it remains a trusted, reliable, and secure choice for revenue teams. With these measures in place, our platform meets the highest standards of security and reliability including SOC 2 Type II certification.

Security Policies

Our security policies can be broken down into a few key areas:
Highly Secure Cloud Infrastructure and 99.9% Uptime Guarantee

Highly Secure Cloud Infrastructure and 99.9% Uptime Guarantee

The foundation of any AI-powered platform is its cloud infrastructure. Ensuring high security and maximum uptime guarantees the reliability and trustworthiness of the service.

Data Retention and Management: Adopt a clear data retention policy, ensuring that data is stored securely and only for as long as necessary. Implement regular audits and data purging schedules to maintain data hygiene.
Security Infrastructure: Deploy advanced security measures including firewalls, intrusion detection systems, and encryption protocols to safeguard against unauthorized access and data breaches.
Availability: Ensure a robust infrastructure with redundancy and failover mechanisms to guarantee 99.9% uptime, minimizing service interruptions and maintaining business continuity.
Unlimited combinations
Best-in-Class User Authentication and Access Management

Highly Secure Cloud Infrastructure and 99.9% Uptime Guarantee

Protecting user accounts from unauthorized access is critical. Strong authentication and access management systems prevent data breaches and maintain user trust.
Here are some ways we bring this believe to life:

Self-Service User Management: Provide best-in-class, highly secure user management that enables customers to self-serve their needs
Two-Factor Authentication (2FA): Offer 2FA to add an extra layer of security beyond just passwords.
Single Sign-On (SSO): Implement SSO options for ease of access while maintaining security, allowing users to authenticate through a trusted provider.
Unlimited combinations
Use of AI Models that Do Not Train on Underlying Data

Highly Secure Cloud Infrastructure and 99.9% Uptime Guarantee

Ensuring that AI models do not train on customer data is essential to protect sensitive information and maintain privacy. We utilize AI models that are pre-trained and only use customer data for output generation, not for further training or model refinement.

Data Retention and Management: Adopt a clear data retention policy, ensuring that data is stored securely and only for as long as necessary. Implement regular audits and data purging schedules to maintain data hygiene.
Security Infrastructure: Deploy advanced security measures including firewalls, intrusion detection systems, and encryption protocols to safeguard against unauthorized access and data breaches.
Availability: Ensure a robust infrastructure with redundancy and failover mechanisms to guarantee 99.9% uptime, minimizing service interruptions and maintaining business continuity.
Unlimited combinations
Data Retention Needs in Line with Customer Expectations

Highly Secure Cloud Infrastructure and 99.9% Uptime Guarantee

Aligning data retention policies with customer expectations is key to transparency and trust. We engage with customers to understand their data retention needs and develop flexible data retention policies that can be tailored to meet diverse customer requirements.

Data Retention and Management: Adopt a clear data retention policy, ensuring that data is stored securely and only for as long as necessary. Implement regular audits and data purging schedules to maintain data hygiene.
Security Infrastructure: Deploy advanced security measures including firewalls, intrusion detection systems, and encryption protocols to safeguard against unauthorized access and data breaches.
Availability: Ensure a robust infrastructure with redundancy and failover mechanisms to guarantee 99.9% uptime, minimizing service interruptions and maintaining business continuity.
Unlimited combinations
Compliant with Best-in-Class Standards for Security

Highly Secure Cloud Infrastructure and 99.9% Uptime Guarantee

Letter AI has obtained industry-recognized certifications demonstrating commitment to security and compliance and ensuring our platform remains secure.

We have received the SOC 2 Type II certification, which involved a comprehensive audits of security, availability, and confidentiality controls.

Data Retention and Management: Adopt a clear data retention policy, ensuring that data is stored securely and only for as long as necessary. Implement regular audits and data purging schedules to maintain data hygiene.
Security Infrastructure: Deploy advanced security measures including firewalls, intrusion detection systems, and encryption protocols to safeguard against unauthorized access and data breaches.
Availability: Ensure a robust infrastructure with redundancy and failover mechanisms to guarantee 99.9% uptime, minimizing service interruptions and maintaining business continuity.
Unlimited combinations