GET YOUR
META LLAMA 3.1 405B
API KEY

Security

  1. Introduction

  2. At Avian, we prioritize the security and privacy of the data you entrust to us. Our commitment is reflected in our robust security framework, designed in line with industry best practices.


  3. Website and Account Security

  4. We prioritize the security of your online interactions with Avian. All communications through our website, account management systems, and purchase processes are encrypted using the latest industry-standard protocols (TLS 1.2+) .


  5. Regular Security Audits and Compliance

  6. Avian undergoes regular security audits and is in the process of acquiring AICPA/SOC2 Type 2 certification. We comply with stringent data protection regulations like GDPR, ensuring a high standard of data privacy and security.


  7. Incident Response Plan

  8. We have a well-defined incident response plan for managing security breaches. This includes prompt detection, reporting, management of incidents, and notification to customers with appropriate remediation steps.


  9. Employee Training and Awareness

  10. Avian conducts comprehensive training programs for employees to adhere to security best practices, including data protection, phishing awareness, and password management.


  11. Customer Support for Security Issues

  12. We offer dedicated support for security concerns. Customers can contact us for assistance with any security issues they encounter.


  13. Multi-Factor Authentication (MFA)

  14. Avian provides Multi-Factor Authentication (MFA) for an added layer of security on user accounts. When you authorise with your connectors you are authorising with the connector provider and not with Avian.


  15. Transparency Reports

  16. We publish transparency reports detailing government data requests and our compliance, upholding our commitment to user privacy and legal obligations.


  17. Connectors and Permissions

  18. Avian uses SSL encryption for all connections, including APIs and customer databases. We adhere to the principle of least privilege, requiring minimal permissions to access your data.


  19. Token Security

  20. Tokens, crucial for secure data access, are protected with advanced encryption methods, ensuring the security of data in transit.


  21. Infrastructure and Physical Safeguards

  22. We employ industry best practices like hardened server environments and multi-factor authentication to ensure the integrity of our physical and digital infrastructure.


  23. Data Storage and Caching

  24. Your data is not stored permanently. We use short-lived, encrypted caches for efficient data management, ensuring security without compromising performance and privacy.