<aside> <img src="/icons/fireworks_gray.svg" alt="/icons/fireworks_gray.svg" width="40px" />

About ChattyAI

</aside>


Welcome To ChattyAI

<aside> <img src="/icons/boombox_gray.svg" alt="/icons/boombox_gray.svg" width="40px" />

Products

</aside>


Service/Network architecture

Development and Code Review Policy

<aside> <img src="/icons/government_gray.svg" alt="/icons/government_gray.svg" width="40px" />

Policies

</aside>


Data Security Measures at ChattyAI

Data Security Manual

Data Classification Policy

Access Control Policy

Incident response plan of action

Log monitoring policy

Alert and notification management

Software Development Life Cycle (SDLC) with Shape Up Methodology

Business continuity policy

Data retention policy

ChattyAI Cryptographic Policy

Entity Risk Analysis: Endpoint Protection Requirements

Security Vulnerability Management Policy

Software Inventory Management Using Microsoft Defender for Endpoint

Network Security Control Configuration Standards

Privacy Policy

Security Policy

<aside> <img src="/icons/map_gray.svg" alt="/icons/map_gray.svg" width="40px" />

Phisical Security

</aside>

Employee remote work security policy

Physical Security


<aside> <img src="/icons/sliders-horizontal_gray.svg" alt="/icons/sliders-horizontal_gray.svg" width="40px" />

Controls

</aside>



Subprocessors

Supplier Management Policy

Microsoft compliance documentation

Service Level Agreement (SLA)