1. Data Security Measures
1.1 Data Encryption
Industry-Standard Encryption
We use industry-standard encryption protocols such as TLS/SSL to encrypt sensitive data during transmission between your device and our servers.
Security Limitations
While we make efforts to ensure secure data transmission, please be aware that no system or encryption is completely foolproof. We cannot guarantee complete protection from interception or unauthorized access.
1.2 Voice Data Processing
Local Voice Processing
All voice data generated from our voice AI features is processed locally on your device, which means that it is not transmitted to external servers unless explicitly requested by you for certain features (e.g., voice model saving).
- If you enable additional cloud-based services, such data may be stored temporarily in secure servers
- We cannot fully eliminate risks associated with online storage
- While we take reasonable precautions to protect voice data, we cannot guarantee complete security of cloud-based storage or third-party services
1.3 Data Storage and Retention
Your data is stored securely in accordance with industry standards, but we do not make promises of indefinite retention or invulnerability. We apply encryption and access controls to protect your data, but please understand that all systems are subject to potential vulnerabilities.
2. User Authentication and Access Control
2.1 Authentication Mechanisms
Secure Login Process
We employ secure login processes, including:
- Password protection with complexity requirements
- Multi-factor authentication (MFA) for enhanced security
- Session management and timeout controls
Authentication Limitations
However, we cannot guarantee absolute protection against brute-force attacks or other sophisticated hacking methods. You are responsible for choosing strong, unique passwords and taking appropriate steps to protect your login credentials.
2.2 Access Control Limitations
We implement role-based access control (RBAC) within our platform to limit access to sensitive data. While we strive to enforce the principle of least privilege, security breaches due to human error or internal mismanagement may still occur. We are continuously working to minimize such risks, but there is no guarantee of complete prevention.
3. Compliance with Industry Standards
Zencia.AI follows generally accepted security practices and prioritizes user data protection, including:
- Implementing industry-standard security measures to protect your personal information
- Adhering to relevant data protection laws and regulations applicable in the regions where we operate
Certification Status
While we are committed to ensuring the privacy and security of your data, please note that we are not currently certified under any specific frameworks such as:
- ISO/IEC 27001
- GDPR compliance certification
- CCPA compliance certification
We continue to monitor the evolving regulatory landscape and are committed to implementing best practices in data protection.
4. Protection Against Unauthorized Access
4.1 Intrusion Detection
We deploy firewalls and intrusion detection systems to monitor for suspicious activities. However, these systems are not infallible and cannot guarantee complete protection against sophisticated attacks or zero-day exploits. While we will make efforts to detect and respond to threats, we cannot guarantee that all threats will be identified and mitigated in real-time.
4.2 Patching and Updates
Regular Updates
We perform regular updates and security patches on our software and infrastructure.
Update Limitations
While these measures reduce risks, we cannot fully eliminate vulnerabilities in third-party software or unforeseen exploits in newly discovered vulnerabilities. We remain committed to keeping our systems updated but acknowledge that this cannot completely prevent all security threats.
5. Data Subject Rights and Limitations
We respect the rights of individuals in relation to their personal data. However, we want to be transparent about the following:
Your Rights
- Right to Access and Deletion: You can request to access or delete your personal data. While we will do our best to honor such requests, please understand that certain data may be retained for legal, security, or operational reasons, even after a deletion request.
- Right to Correct Data: If your personal data is inaccurate, we will work with you to correct it. However, it may not be possible to correct all inaccuracies in every case.
- Right to Withdraw Consent: If you withdraw consent for processing your data, we will cease processing as required, but certain transactions or interactions may require the retention of your data for processing.
Data Deletion Limitations
Please note, if you request the deletion of your data, we may not be able to immediately remove all records, particularly those required for compliance or for business continuity purposes.
6. Limitations and Risks
6.1 No Absolute Security Guarantee
Important Security Disclaimer
While we implement comprehensive security measures to safeguard your data, it is important to understand that no system is completely invulnerable.
- We make no claims that our system is immune to cyber-attacks, data breaches, or unauthorized access
- By using our Services, you acknowledge that no matter the precautions, the risk of data breaches remains
- We cannot guarantee absolute protection
6.2 Third-Party Services
Third-Party Integration Risks
Zencia.AI may integrate with third-party services or cloud providers. While we select reputable providers, we cannot control their security practices.
- Data handled by third-party services may not be fully secured according to Zencia.AI's standards
- We strongly advise you to review the privacy and security policies of any third-party services you choose to integrate with Zencia.AI
7. Incident Response and Breach Notification
Breach Notification Process
In the event of a data breach, we will promptly notify affected users when required by law or contractual obligations.
Response Limitations
However, we cannot guarantee an immediate response or full resolution of the issue within a set timeframe. Breach notifications will include:
- Details on the nature of the breach
- Information about affected data
- Actions taken to address the breach
Due to the complexity of security incidents, it may take time to fully assess and mitigate the impact.
8. User Responsibility
Your Security Responsibilities
While we take extensive measures to protect your data, we also rely on users to help maintain the security of their accounts. You are responsible for:
- Using strong, unique passwords
- Enabling multi-factor authentication (MFA) whenever possible
- Regularly reviewing and managing account permissions and access
- Keeping your devices and software updated
- Reporting suspicious activities immediately
9. Security of Third-Party Services
Third-Party Integration Disclaimer
If you integrate Zencia.AI with third-party services, we are not responsible for the security practices of those third-party services. You should review the security policies of any third-party providers you use in conjunction with Zencia.AI.
10. Contact Us
If you have any concerns or questions regarding the security of your data, please contact us at:
Zencia AI Tech Private Limited
101, Ground Floor, 5/68 Vishal Khand, Gomti Nagar,
Lucknow – 226010, Uttar Pradesh, India
11. Changes to This Security Page
We may update this Security and Safety Page from time to time. Any changes will be posted on this page, and we will notify you of material changes. Continued use of our Services after changes to this page constitutes your acceptance of the updated terms.