At eduBITES, the security and privacy of your data are our top priorities. We understand that trust is built on transparency, which is why we’ve created this Trust Center to provide you with clear, straightforward information about how we protect your data.
Whether you’re a client, partner, or simply curious about our practices, you’ll find detailed answers to common questions about data security, privacy, compliance, and the technical measures we use to keep your information safe.
Types of Data Collected:
i) Personal Data:
eduBITES collects personal user data, including your name, email, job title, and user activity. This data is crucial for providing you with a personalized and effective experience on the platform.
ii) Company Content:
Company data includes any content you create, upload, or generate on our platform, as well as results from knowledge sprints. This data is essential for enabling your organization to capture and utilize knowledge effectively.
How eduBITES Deals with Data:
All personal and company data is securely stored in AWS data centers located in Frankfurt, Germany. This location was specifically chosen to ensure compliance with European data privacy standards like GDPR.
To protect your data, we use advanced encryption methods such as AES-256, which makes it unreadable to unauthorized users. During data transfers, we implement additional security measures through HTTPS/TLS 1.2, safeguarding your data while it’s in transit.
eduBITES also adheres to AWS security best practices, including the use of AWS Key Management Service (KMS) for encryption key management and AWS Identity and Access Management (IAM) for controlling access to AWS resources.
For business administration tasks like CRM and project management, we collect personal data through Google Cloud (EU) and Monday.
Subprocessors:
In some cases, subprocessors may be involved in processing and storing your company content. We continuously monitor these subprocessors to maintain the highest levels of security and data protection. For further information, refer to our list of subprocessors
Example of Subprocessor:
We use Elai for creating synthetic media and custom avatars. All content produced through Elai is stored on their servers in AWS data centers in Frankfurt, ensuring compliance with GDPR and ISO 27001.
We have a clear process for deleting personal data. If your contract with us ends, we manually delete your data within 60 days, ensuring it’s completely removed from our systems.
We use multiple layers of security to protect your data. This includes encryption methods like AES-256, which ensures your data remains unreadable to anyone without the proper access. Strong network protections, such as firewalls and intrusion detection systems, are also in place. Our team is regularly trained on data security, and we constantly monitor our systems and conduct security audits to catch any potential vulnerabilities early.
Access to your data at eduBITES is carefully managed and monitored to ensure that only authorized individuals and systems can interact with it.
Yes, we have separate environments for development, testing, and live operations. This separation ensures that any testing we do won’t affect your data or the live system, keeping everything secure.
We take data protection seriously and follow strict regulations like GDPR. This means we only collect the data we need, keep it accurate, and protect it with strong security measures. We also conduct regular audits to make sure we’re following these rules. Although we’re not yet ISO 27001 certified, we align our practices with its standards and are committed to transparency by making audit results available on request.
eduBITES has implemented several measures to ensure that information subject to confidentiality agreements or similar restrictions is not passed on without authorization:
These comprehensive measures create a secure environment that minimizes the risk of unauthorized disclosure of confidential information
Our Gen AI application is built to be secure, scalable, and easy to integrate with other services. Here’s how it works:
Third-Party Integration: We securely integrate with trusted third-party services, each playing a specific role:
We recommend starting with our Explore package, a trial version that showcases what eduBITES can do. During this trial, your IT team can review our legal documents, such as our data policy and privacy policy. If they have any questions, our Data Security Officer is available to help. Because eduBITES is cloud-based, it reduces the workload for your IT team by eliminating the need for server maintenance. We also comply with strict data security standards like GDPR and ISO 27001, ensuring that your data is protected. Additionally, we conduct regular security audits and monitor our systems continuously to keep everything secure.
Your rights under GDPR are important to us. This section explains how you can exercise your rights, including accessing your data, requesting corrections, or asking for your data to be deleted. We provide a simple process to help you with these requests.
For more information or to make a request, please contact our Data Protection Officer (DPO) at security@eduBITES.com.
To provide further transparency, we encourage you to review our key policies and documents:
If you have questions that aren’t covered in our FAQs, we’re here to help. Our support team, including our Data Protection Officer, is available to answer any specific concerns you might have about data security, privacy, or compliance.
Email Our Support Team: support@eduBITES.com
Contact Our Data Protection Officer (DPO): security@eduBITES.com
eduBITES is dedicated to make learning happen through the intelligent repurposing of knowledge, engaging content, progressive technology and meaningful didactics.