Security and privacy are core priorities at Gleef. We implement industry-standard security measures and follow strict privacy guidelines to protect your data.

Data storage

Infrastructure

  • Embeddings are stored in secure, encrypted vector databases
  • All data is processed and stored in EU-based servers
  • Regular backups ensure data durability
  • Access is strictly controlled through authentication tokens
  • No raw text is stored, only vector representations
  • Embeddings are only accessible by your company and are not shared or used for any training

Security measures

  • End-to-end encryption
  • Regular security audits
  • Multi-factor authentication
  • IP whitelisting options
  • Real-time threat monitoring

Data retention

Retention policies

  • Embeddings are retained as long as your account is active
  • Deleted keys are removed from the database within 30 days
  • Backup copies are retained for 90 days
  • You can request complete data removal at any time
  • Import history is maintained for 12 months

Data management

  • Full data export available
  • Selective key deletion
  • Audit logs for all changes
  • Version history
  • Regular cleanup processes

Compliance

Certifications and standards

  • GDPR compliant processing and storage
  • Regular security audits and penetration testing
  • Data Processing Agreement (DPA) available upon request
  • Annual compliance reviews and updates

Privacy measures

  • Data minimization principles
  • Privacy by design approach
  • Regular privacy impact assessments
  • Transparent data processing
  • Clear data usage policies

Access control

Authentication

  • Multi-factor authentication support
  • Single Sign-On (SSO) options
  • Role-based access control
  • Session management
  • Activity monitoring

Authorization

  • Granular permission settings
  • Team access controls
  • API key management
  • Audit logging
  • Access reviews

Incident response

Response plan

  1. Immediate threat containment
  2. Impact assessment
  3. Stakeholder notification
  4. Resolution implementation
  5. Post-incident review

Reporting

  • 24/7 security monitoring
  • Incident response team
  • Regular status updates
  • Post-incident reports
  • Preventive measures implementation

Additional resources

For security-related inquiries, please contact our security team at security@gleef.eu