Privacy and compliance
Solutions built over the Virtue's Affective Computing framework are designed to meet the highest security and data compliance standards.
Virtue's Affective Computing ensures enterprise-grade cybersecurity and privacy protection, making it suitable for large enterprises and government organization.
How do we provide enterprise-grade security?
Each user in the EDAA™ framework is assigned a unique key that is securely linked to a device UUID or a client-specific identifier.
All databases are hosted within a private network that is entirely inaccessible to the public.
To further ensure data security, only authorized web server instances are permitted to access these databases, providing a robust and secure environment for sensitive data.
EDAA™, the underlying technology that powers Affective Computing, goes beyond legacy data compliance protocols by providing enterprise-grade anonymization and cybersecurity.
EDAA™ securely handles all the data it processes and protects it by encryption and other security measures to prevent unauthorized access and breaches.
Although EDAA™ processes user data in real-time, it does not store any personal or sensitive information. By doing this, it ensures that all personal information is used only momentarily for immediate analysis.
To ensure data compliance, we employ the following techniques:
Data sanitation
We use the following techniques to implement data sanitation:
Hot training and non-storage of data
AES-128 bit encryption of communication
Intellectual property protection protocols
Keep it secret
The Keep it secret functionality helps solution developers hide the actions created in a project from EDAA™.
This functionality enables our clients to rest assured that EDAA™ isn't using their data in any other projects and enables us to support EDAA™-powered solutions for large and government organizations that are concerned about privacy.
For more information, see Keep it secret.
Real-time data processing
EDAA™ processes user data in real-time without storing personal or sensitive information. This ensures that personal information is used only for immediate analysis.
Last updated
Was this helpful?