Skip to main content

Data Security & Privacy

At Keymate.AI, privacy and security are foundational. This guide explains how your data is handled, protected, and kept private across all Keymate services.


๐Ÿ”’ Does Keymate.AI Use My Data to Train AI?โ€‹

No. Your data is never used to train any AI models.

We guarantee:

  • Your chats, prompts, uploaded documents, and Keymate Memory content are never used for training.
  • Keymate.AI never shares or resells your data.

โš ๏ธ If you're using Keymate as a plugin or inside a custom GPT, OpenAI may still use your inputs for training unless you have opted out. Learn how to control your data on ChatGPT.


๐Ÿ” How Is My Data Encrypted, Stored, and Transmitted?โ€‹

Keymate encrypts and secures your data at every level:

In Transitโ€‹

  • All traffic is encrypted using TLS 1.2+, ensuring secure transmission.

At Restโ€‹

  • Keymate data is hosted on Amazon Web Services (AWS).
  • Amazon EBS encryption is enabled by default for all EC2 storage.
  • Encryption keys are securely managed via AWS Key Management Service (KMS).

๐Ÿ” Learn more about EBS encryption


โœ… Is Keymate.AI Compliant with Data Regulations?โ€‹

While Keymate is not intended for sensitive data storage, we still follow industry best practices in data handling and partner only with compliant providers.

Our Hosting and Data Partners:โ€‹

  • Weaviate (Self-hosted / Cloud options on AWS & Azure): All vector data is stored as encrypted embeddings using OAuth-based access controls. Weaviate supports compliance with SOC2 Type II and GDPR, and offers enterprise-grade security for handling vectorized data.

Weaviate security documentation

  • Amazon Web Services (AWS): Meets certifications including SOC 1, 2, 3, ISO/IEC 27001/27017, HIPAA, PCI DSS, FedRAMP, and more.

    AWS security certifications

Certification Statusโ€‹

We operate with the intent to meet SOC 2, HIPAA, and other standards. While not formally certified yet, we are building Keymate to meet those benchmarks and are actively guided by security professionals.


๐Ÿงช Has Keymate Undergone Third-Party Security Audits?โ€‹

We have not yet completed a formal external audit, but our security protocols are guided by an external audit consultant. We're committed to building a platform that meets rigorous standards and will pursue certifications as we scale.


๐Ÿ›ก๏ธ What Measures Are in Place to Prevent Data Breaches?โ€‹

We proactively guard against threats with layered defense systems and experienced oversight.

Key Security Tools and Practicesโ€‹

  • Amazon Cognito: Protects against brute-force login attempts
  • AWS CloudTrail: Tracks and audits all API activity
  • AWS CloudFront: Protects against DDoS attacks
  • Amazon Inspector: Continuously scans for vulnerabilities

Incident Responseโ€‹

If a breach or threat is detected:

  • Our expert security team (with 20+ years of experience) investigates immediately.
  • Affected users will be notified within 24 hours, per our internal response protocol.

๐Ÿ“ฌ Questions or Concerns?โ€‹

If you have a security concern or need help, reach out to us at [email protected].