Industry
ConverSight.ai is committed to making security,
privacy, and compliance a top priority for your business.
ConverSight.ai maintains a Privacy Statement to explain our practices regarding the collection, use and disclosure of information that we receive.
ConverSight.ai makes use of both session and persistent cookies. Session cookies live just for the duration of your web session and are deleted when you close your browser. Persistent cookies remain in one of your browser’s subfolders until you erase them manually or until your browser deletes them based on the cookie’s duration term. Read more about our cookies policy in our Terms of Services and Privacy Policy.
ConverSight.ai does not store or process any cardholder information and does not meet the Payment Card Industry Data Security Standards as a processor, merchant, or service provider (PCI DSS). Read more about our payment of fees policies in our Terms and Conditions.
ConverSight.ai does not sell, mine, or access your information for the purpose of advertising. We further guarantee that only authorized, vetted contractors and ConverSight.ai personnel will have access to customer data on a need-to-know basis.
To protect ConverSight.ai workers, assets, and data, ConverSight.ai secures its facilities and workstations against unwanted entry. To maintain utmost security, all ConverSight.ai employees, contractors, and third-parties with a legitimate business need to physically enter any ConverSight.ai premises must follow the security criteria.
ConverSight.ai’s data centers are built to anticipate and withstand failure while maintaining service levels. In the event of a failure, automated mechanisms redirect traffic away from the damaged location, and there is enough capacity to load-balance traffic to the other sites.
We back up our critical system components across multiple, isolated locations to operate independently and with high reliability. Highly resilient systems provide the greatest levels of service availability and enable customers to meet extremely quick recovery time and recovery point targets in the event of an outage.
ConverSight.ai’s data centers are built to anticipate and withstand failure while maintaining service levels. In the event of a failure, automated mechanisms redirect traffic away from the damaged location, and there is enough capacity to load-balance traffic to the other sites.
All personnel who require access to the data center must first apply and give a good business explanation. These requests are approved and reviewed based on the concept of least privilege.
In compliance with ConverSight.ai’s Background Check Policy, we conduct background checks on all employees in accordance with applicable laws and regulations, and proportional to the business requirements, the sensitivity of the material to be accessed, and the expected hazards.
ConverSight.ai requires security training to help employees avoid creating undue risk.
Before it leaves our secure facilities, all data moving across the worldwide network that connects our data centers and regions is automatically encrypted. ConverSight.ai easily encrypts your data in transit and at rest using AWS technologies, ensuring that only authorized users may access it. AWS Key Management Service (KMS) or CloudHSM handle encryption keys using FIPS 140-2 Level 3 verified HSMs.
ConverSight.ai provides you with the visibility and control you need to comply with regional and local data privacy legislation. The AWS global infrastructure is designed to provide you complete control over the areas where your data is physically stored, making it easier to meet data residency requirements.
You can restrict a group’s access down to the table row with row level security (RLS). ConverSight.ai evaluates user’s the user’s access to the rules and prohibits the restricted data from being displayed. As a result, users only view the data that they are allowed to see.
Information security risk assessments are performed by ConverSight.ai as part of a risk governance program that tests, examines, and analyzes the security program’s performance on a regular basis. To handle new and growing security technology, changes to industry standard practices, and changing security threats, such evaluations recognize and assess the effect of risks and adopt risk reduction or mitigation techniques.
ConverSight.ai conducts security risk evaluations to assess risks to information assets, identify potential vulnerabilities, and provide remedy. To fix known vulnerabilities, software patches are applied to customer instances on a regular basis.
When software vulnerabilities are discovered and addressed by a vendor patch, ConverSight.ai will obtain the patch from the relevant vendor and apply it in accordance with ConverSight.ai’s current vulnerability management and security patch management standard operating procedure, but only after it has been tested and determined to be safe for installation in all production systems.
Vulnerabilities or other security concerns can be emailed to support@conversight.ai with the phrase “Security Vulnerability” in the subject line.
Please provide any supporting materials, as well as clear, concise methods to reproduce the issue in order to assist us in understanding the nature and severity of the vulnerability.
We will acknowledge receipt of your report as soon as possible and explain the next steps in the process. The results of the initial inquiry, as well as a plan for resolution, will be sent to you once it is completed.
ConverSight.ai maintains a Privacy Statement to explain our practices regarding the collection, use and disclosure of information that we receive.
This page details ConverSight.ai’s obligations to subscribers and licensees.
This page includes items related to third-party usage, content ownership, copyright notices, payments, and additional information.
Contextual decision intelligence for
supply chain optimization.
© 2021 ConverSight.ai.
For more information, contact info@conversight.ai.