Safety & Security
Our commitment to protecting your data and ensuring safe AI operations
Last Updated: November 2024
1. Data Security
Better X LLC implements industry-leading security measures to protect your data:
- End-to-end encryption for all data transmission
- AES-256 encryption for data at rest
- Regular security audits and penetration testing
- Multi-factor authentication (MFA) for all user accounts
- Role-based access control (RBAC) for sensitive data
- Continuous monitoring and threat detection systems
2. AI Safety Measures
Our AI systems are designed with safety and reliability as top priorities:
- Regular AI model audits to detect and prevent bias
- Human oversight for critical business decisions
- Transparent AI decision-making processes
- Fail-safe mechanisms to prevent incorrect automated actions
- Continuous model monitoring for anomalous behavior
- Clear escalation paths for AI-generated responses
3. Infrastructure Security
Our infrastructure is built on secure, reliable cloud platforms:
- SOC 2 Type II certified data centers
- Redundant systems for 99.9% uptime guarantee
- Automated backup systems with point-in-time recovery
- DDoS protection and web application firewalls
- Network segmentation and isolation
- Regular software updates and security patches
4. Access Control
We maintain strict access controls to protect your data:
- Principle of least privilege (PoLP) for all systems
- Regular access reviews and permission audits
- Automated session timeouts for inactive users
- Secure API authentication with OAuth 2.0 and JWT tokens
- IP whitelisting options for enterprise clients
- Comprehensive audit logs for all data access
5. Compliance & Certifications
Better X LLC maintains compliance with industry standards and regulations:
- GDPR compliant for European Union data protection
- CCPA compliant for California consumer privacy
- HIPAA compliant for healthcare data (where applicable)
- PCI DSS compliant for payment processing
- SOC 2 Type II certification
- ISO 27001 information security management
6. Incident Response
We have comprehensive incident response procedures in place:
- 24/7 security operations center (SOC) monitoring
- Rapid incident detection and response protocols
- Clear communication channels for security incidents
- Post-incident analysis and continuous improvement
- Breach notification within 72 hours as required by law
- Regular incident response training and drills
7. Employee Training & Awareness
All Better X LLC employees undergo comprehensive security training:
- Mandatory security awareness training for all employees
- Regular phishing simulation exercises
- Data handling and privacy best practices
- Incident reporting procedures
- Background checks for all employees with data access
- Signed confidentiality and non-disclosure agreements
8. Physical Security
Our data centers maintain strict physical security controls:
- Biometric access controls and security badges
- 24/7 on-site security personnel
- Video surveillance and monitoring
- Secure visitor management procedures
- Environmental controls (fire suppression, temperature monitoring)
- Regular security assessments and penetration testing
9. Third-Party Vendor Security
We carefully vet and monitor all third-party vendors:
- Comprehensive vendor security assessments
- Regular vendor security reviews and audits
- Contractual security requirements for all vendors
- Limited data sharing with third parties
- Continuous monitoring of vendor security posture
- Right to audit vendor security practices
10. Data Retention & Secure Deletion
We implement secure data lifecycle management:
- Clear data retention policies based on business needs
- Automated data deletion after retention period
- Secure data destruction methods (DOD 5220.22-M standards)
- Customer-initiated data deletion requests honored within 30 days
- Backup data included in deletion processes
- Certificates of destruction available upon request
11. Vulnerability Management
We proactively identify and address security vulnerabilities:
- Regular vulnerability scanning and assessment
- Bug bounty program for responsible disclosure
- Rapid patching of critical security vulnerabilities
- Third-party security audits and penetration testing
- Code review and static analysis for all deployments
- Continuous integration security testing
12. Customer Safety Controls
We provide customers with tools to maintain their own security:
- Configurable security settings and preferences
- Activity logs and audit trails
- Alerts for suspicious account activity
- Ability to revoke access tokens and sessions
- Data export tools for backup and migration
- Granular permission controls for team members
13. AI Voice Interface Safety
Our voice AI systems include specific safety measures:
- Voice biometric authentication for secure access
- Real-time transcription and monitoring for quality assurance
- Automatic profanity and content filtering
- Emergency escalation protocols for critical situations
- Recording consent and disclosure compliance
- PII detection and redaction in voice data
Contact Our Security Team
If you have questions about our safety and security practices or need to report a security concern, please contact us:
Email: hello@gobetterx.com
For urgent security matters, please use our security email address for fastest response.
