Purpose of Document
This document outlines the sub-processors used by Jeeva.ai to provide services to clients. Each subprocessor processes data under strict security protocols and in compliance with relevant data protection laws. This page provides important information about the identity, location and role of each sub-processor.
Subprocessors
1. Microsoft Azure
Purpose: Provides secure AI processing for email draft generation, enrichment, and classification on Azure's secure servers.
Data Type Processed: Same scope as OpenAI; predominantly transactional with minimal personal data.
Data Retention: Follows the retention policies outlined above.
Security Measures: Encrypted data exchanges within Azure’s private cloud environment.
Compliance: SOC 2 certified.
2. Amazon Web Services (AWS)
Purpose: Primary deployment and hosting platform for Jeeva.ai’s application stack.
Data Type Processed: All operational data for client and application use.
Security Measures: Data stored in the us-east-1 region, encrypted at rest and in transit through AWS’s secure protocols.
Compliance: Compliant with SOC 3 standards.
Incident Response: AWS enables quick re-provisioning in the event of a breach.
3. MongoDB
Purpose: Database service used to store platform data, including email records and client data for operational needs.
Data Type Processed: Predominantly transactional data related to client business operations.
Data Retention: Maintains hourly, daily, and monthly backups for reliability.
Security Measures: Data is encrypted both at rest and in transit.
Compliance: SOC 2 certified.
Incident Response: MongoDB backup protocols ensure data recovery in case of any breach or data loss.
Data Subject Rights and Access
Sub-processors provide controls for data subject rights, including access, correction, deletion, or data portability as stipulated within their respective policies.
Geographic Location of Data Processing
All data processing for involve.ai is conducted within the us-east-1 AWS region, ensuring compliance with regional data processing regulations.
Incident and Breach Response Protocol
In the event of a data breach, involve.ai and its sub-processors maintain response protocols, including secure re-provisioning on AWS and adherence to MongoDB’s robust backup policies.
Last updated: Oct 13, 2024
Last updated: Oct 13, 2024