Entreprise Privacy

Our commitments

Ownership
You own and control your data
  • We do not train on your data from KEDE Enterprise or our API Platform
  • You own your inputs and outputs (where allowed by law)
  • You control how long your data is retained (KEDE Enterprise)
Control
You decide who has access
  • Enterprise-level authentication through SAML SSO
  • Fine-grained control over access and available features
Security
You decide who has access
  • Data encryption at rest (AES-256) and in transit (TLS 1.2+)
 

General FAQ

The easiest way to get started with KEDE is to grant access KEDE Enterprise for your employees. It’s simple to use and allows anyone in your organization to be productive with AI for data processing and analytics.
Check Business Cases ideas and also check out KEDE's Business Applications for different types of businesse
No. We do not use KEDE Enterprise or API data, inputs, and outputs for training AI models.
You retain all rights to the inputs you provide to our services. You also own any output you rightfully receive from the services to the extent permitted by law. We only receive rights in input and output necessary to provide you with our services, comply with applicable law, and enforce our policies
KEDE encrypts all data at rest (AES-256) and in transit (TLS 1.2+), and uses strict access controls to limit who can access data.
Yes, we are able to execute a Data Processing Addendum (DPA). Please download the DPA template here (PDF format) and send it to us filled in and signed to privacy@kede.ai , we will return it signed back to you.
We may run any business data submitted to KEDE services through automated content classifiers. Classifiers are metadata about business data but do not contain any business data itself. Business data is only subject to human review on a service-by-service basis.
 

KEDE Enterprise FAQ

KEDE Enterprise is the business version of KEDE, allowing businesses to have a powerful data processing and analysis tool that can be applied to any department of the company.
With KEDE Enterprise, the company gains in productivity and competitiveness from the data and the conclusions reached after its analysis.
Within your organization, only end users can view their conversations. Workspace admins have control over workspaces and access. ​​Authorized KEDE employees will only ever access your data for the purposes of resolving incidents, recovering end user data input with your explicit permission, or where required by applicable law.
KEDE Enterprise securely retains data to enable features like input data history. You control how long your data is retained. You can delete it whenever you want.
 

Database Connection FAQ

KEDE allows you to connect any database in your company using a URI, which also allows you to specify very precisely which fields you want to use for the analy
KEDE may securely retain Database URI inputs and outputs for up to 30 days to identify abuse. You can also request zero data retention (ZDR) for eligible endpoints if you have a qualifying use-case.
Kede for: