EasyBotChat Security Overview

Your security & privacy are our top priorities

🔐

Encrypted in transit and rest

SSL encryption during transit. Industry-standard 256-bit AES encryption at rest.

🇪🇺

GDPR

SSL encryption during transit. Industry-standard 256-bit AES encryption at rest.

Updated Nov 1, 2025

⛓️‍💥

No data sharing

Fully-self contained bots with no data sharing between bots, even within the same account.

⛔️

Privacy First

We never store your files, unless you choose to see them in responses. By default, your chatbot is private, which means only authorized users can query your chatbot.

FAQ
Compliance & Security

🛡️

SOC 2

EasyBotChat is SOC 2 Type II compliant, ensuring our platform meets the highest security, availability, confidentiality, and privacy standards.

Secure Vendors

Best practices from secure vendors like AWS and OpenAI.

Frequently Asked Questions

  • Absolutely. EasyBotChat is built on strong privacy principles, ensuring that any information uploaded to a bot remains within that bot’s environment, not shared with other bots, even those in the same account. Please visit our security principles at https://EasyBot.chat/security/


    It’s important to note that your data will not be incorporated into OpenAI training sets. For more details, please see their announcement and data usage policy : https://openai.com/policies/api-data-usage-policies.

  • Yes, the data loaded into EasyBotChat via CSV file remains entirely private. Furthermore, OpenAI has clarified that it does not use data from API calls for training their models. You can read more about this at https://techcrunch.com/2023/03/01/addressing-criticism-openai-will-no-longer-use-customer-data-to-train-its-models-by-default/.

  • No, any data you interact with on EasyBotChat is not used to enhance the learning of ChatGPT. It’s confined to your specific bot, ensuring your content remains local and private. For further information, you can review OpenAI’s data usage policies at : https://openai.com/policies/api-data-usage-policies

  • No, the data you share with EasyBotChat remains private and is not used to teach or provide insight for others. We have stringent data handling practices in place to ensure your data’s security and confidentiality. In fact, the data from one bot within your account has no effect on other bots within even your own account. Each bot is its own data silo.

  • EasyBotChat prioritizes data privacy. We ensure that your business data stays safe by storing it in isolated environments per bot and not using it for any other purposes, including model training. You can find more about our data privacy policies at https://EasyBot.chat/security/

  • No, any documents you upload, including an employee handbook, will not be used by OpenAI or contribute to its model training. Your documents remain strictly within the context of your specific EasyBotChat bot.

  • Yes, EasyBotChat operates under a DPA. As for data collection, EasyBotChat collects minimal user data required for service operation and improvement, in compliance with privacy laws and regulations.

  • Yes, EasyBotChat is designed with a high level of security and ensures that every project is completely isolated from others. This isolation applies even to multiple projects under the same account. You can read more about our security measures at : https://EasyBot.chat/security/

  • Yes – there is an option to immediately delete the original files after processing. This gives you added protection.

  • No, your business data is not used to train the ChatGPT model. The information you provide when interacting with EasyBotChat stays strictly within your specific bot instance and is not incorporated into any OpenAI model training. See OpenAI’s data usage policy: https://openai.com/policies/api-data-usage-policies.

  • EasyBotChat, while built on top of the OpenAI’s ChatGPT API, operates within its private VPC instance in Amazon AWS US East. This ensures that your data and interactions are segregated and not mixed with the general ChatGPT usage or with other users.

  • EasyBotChat supports the GDPR by having policies in place that protect your privacy and data rights. EasyBotChat is also SOC 2 Type 2 certified, ensuring compliance to data security and privacy measures.

  • Yes, EasyBotChat is SOC 2 Type II compliant.

Compliance & Controls

  • Identify Validation

    Entity ensures that logical access provisioning to critical systems requires approval from authorized personnel on an individual need or for a predefined role.


    Termination of Employment

    Entity ensures logical access that is no longer required in the event of termination is made inaccessible in a timely manner.


    Multi-factor Authentication

    Entity requires that all staff members with access to any critical system be protected with a secure login mechanism such as Multifactor-authentication.


    Encrypting Data At Rest

    Entity has set up cryptographic mechanisms to encrypt all production database[s] that store customer data at rest.


    Data Backups

    Entity backs up relevant user and system data regularly to meet recovery time and recovery point objectives and verifies the integrity of these backups.


    Testing for Reliability and Integrity

    Entity tests backup information periodically to verify media reliability and information integrity.


    Transfer of PII

    Entity ensures appropriate procedures are in place to ensure compliance with regulatory requirements related to transfer of personal data outside of the region from which it is collected

  • External System Connections

    Every Production host is protected by a firewall with a deny-by-default rule. Deny by default rule set is a default on the Entity's cloud provider.


    Transmission Confidentiality

    Entity has set up processes to utilize standard encryption methods, including HTTPS with the TLS algorithm, to keep transmitted data confidential.


    Anomalous Behavior

    Entity's infrastructure is configured to review and analyze audit events to detect anomalous or suspicious activity and threats


    Centralized Collection of Security Event Logs

    Entity's infrastructure is configured to generate audit events for actions of interest related to security for all critical systems.

  • Conspicuous Link To Privacy Notice

    Entity displays the most current information about its services on its website, which is accessible to its customers.


    Approval of Changes

    Entity has established procedures for approval when implementing changes to the operating environment.

  • Malicious Code Protection (Anti-Malware)

    Where applicable, Entity ensures that endpoints with access to critical servers or data must be protected by malware-protection software.

    Full Device or Container-based Encryption

    Where applicable, Entity ensures that endpoints with access to critical servers or data must be encrypted to protect from unauthorized access.

    Endpoint Security Validation

    Entity has set up measures to perform security and privacy compliance checks on the software versions and patches of remote devices prior to the establishment of the internal connection.

    Endpoints Encryption

    Entity requires that all critical endpoints are encrypted to protect them from unauthorized access.

  • Code of Business Conduct

    Entity has a documented policy to define behavioral standards and acceptable business conduct.


    Organizational Structure

    Entity maintains an organizational structure to define authorities, facilitate information flow and establish responsibilities.


    Roles & Responsibilities

    Entity has established procedures to communicate with staff about their roles and responsibilities.


    New Hire Policy Acknowledgement

    Entity has established procedures for new staff to acknowledge applicable company policies as a part of their onboarding.


    Security & Privacy Awareness

    Entity provides information security and privacy training to staff that is relevant to their job function.


    Performance Review

    Entity requires that all employees in client serving, IT, Engineering, and Information Security roles are periodically evaluated regarding their job responsibilities.


    Periodic Policy Acknowledgement

    Entity has established procedures for staff to acknowledge applicable company policies periodically.


    Automated Reporting

    Entity has provided information to employees, via various Information Security Policies/procedures, on how to report failures, incidents, concerns, or other complaints related to the services or systems provided by the entity in the event there are problems.


    Incident Reporting Assistance

    Entity has provided information to customers on how to report failures, incidents, concerns, or other complaints related to the services or systems provided by the Entity in the event there are problems.


    Risk Framing

    Entity performs a formal risk assessment exercise annually, as per documented guidelines and procedures, to identify threats that could impair systems' security commitments and requirements.


    Risk Assessment

    Each risk is assessed and given a risk score in relation to the likelihood of it occurring and the potential impact on the security, availability, and confidentiality of the Company platform. Risks are mapped to mitigating factors that address some or all of the risk.


    Fraud

    Entity considers the potential for fraud when assessing risks. This is an entry in the risk matrix.


    Third-Party Criticality Assessments

    Entity performs a formal vendor risk assessment exercise annually to identify vendors that are critical to the systems' security commitments and requirements.


    Assigned Cybersecurity & Privacy Responsibilities

    Entity's Senior Management assigns the role of Information Security Officer who is delegated to centrally manage, coordinate, develop, implement, and maintain an enterprise-wide cybersecurity and privacy program.


    Periodic Review & Update of Cybersecurity & Privacy Program

    Entity's Senior Management reviews and approves the state of the Information Security program including policies, standards, and procedures, at planned intervals or if significant changes occur to ensure their continuing suitability, adequacy, and effectiveness.


    Management Review of Org Chart

    Entity's Senior Management reviews and approves the Organizational Chart for all employees annually.


    Management Review of Risks

    Entity's Senior Management reviews and approves the "Risk Assessment Report" annually.


    Management Review of Third-Party Risks

    Entity's Senior Management reviews and approves the "Vendor Risk Assessment Report" annually.


    Subservice organization evaluation

    Entity reviews and evaluates all subservice organizations periodically, to ensure commitments to Entity's customers can be met.


    Segregates Roles and Responsibilities

    Entity's Senior Management segregates responsibilities and duties across the organization to mitigate risks to the services provided to its customers.


    Subprocessor Requirements

    Entity ensures that appropriate remediation measures are in place when personal data is shared with vendors as a part of its processing activities


    Data Protection Impact Assessment (DPIA)

    Entity conducts Data Protection Impact Assessments periodically in order to assess the regulatory risks associated with the processing of personal data


    EU Representative

    Entity appoints a EU Representative to serve as a point of contact between EU authorities, data subjects and the organization


    Testing

    Entity has procedures to conduct regular tests and exercises that determine the effectiveness and the readiness to execute the contingency plan.


    Chief Privacy Officer (CPO)

    Entity appoints a Privacy Officer to assess and facilitate the entity's compliance with relevant regulatory requirements.


    Asset Ownership Assignment

    Entity has set up mechanisms to assign and manage asset ownership responsibilities and establish a common understanding of asset protection requirements.


    New Hire Security & Privacy Training Records

    Entity has established procedures for new staff to complete security and privacy literacy training as a part of their onboarding.


    Periodic Security & Privacy Training Records

    Entity documents, monitors, and retains individual training activities and records.


    Updates During Installations / Removals

    Entity periodically updates and reviews the inventory of systems as a part of installations, removals, and system updates.


    Inventory of Endpoint Assets

    Entity develops, documents, and maintains an inventory of organizational endpoint systems, including all necessary information to achieve accountability.