Security & Compliance

Security & Compliance

Learn how Kayse AI keeps your data safe and helps you follow the rules. 🔒

🌟 Overview

Kayse AI is built with security baked in from the start. We use industry-standard practices to protect your data and help you stay in line with regulations.

🔐 Data Security

Encryption

LayerProtection
In TransitAll data is scrambled using TLS 1.2+ while it travels
At RestStored data is locked with AES-256 encryption
BackupsBackups are encrypted with secure key management
APIAll API calls must use HTTPS

🏗️ Infrastructure Security

MeasureDescription
Cloud HostingRuns on top-tier cloud servers
Network IsolationPrivate networks keep customer data separate
FirewallsWeb firewalls block attacks
DDoS ProtectionProtection against overload attacks
RedundancyMultiple data centers for reliability

🏢 Data Centers

🚪 Access Control

Authentication

FeatureDescription
Password RequirementsMinimum length and complexity rules
Two-Factor AuthenticationOptional 2FA for all users
Session ManagementSessions expire after inactivity
Single Sign-OnSSO is available if you need it

Authorization

FeatureDescription
Role-Based AccessEach role gets specific permissions
Least PrivilegePeople only get the access they need
Company IsolationData is completely separate between companies
API Key ScopesAPI keys can be limited to specific tasks

👥 User Roles

RoleAccess Level
Super AdminFull access, including billing and security settings
AdminFull feature access, but can't change security settings
UserCan only access assigned cases and basic features
ClientPortal access only — can see their own data

📝 Audit Logging

What Gets Logged

Every important action is recorded:

CategoryExamples
AuthenticationLogins, logouts, failed attempts, 2FA events
Data AccessViewing records, searching, exporting
Data ChangesCreating, updating, deleting records
SettingsChanging settings, managing users
API ActivityAPI calls with times and results
CommunicationsMessages sent, calls made

📅 Log Retention

PlanRetention Period
Standard90 days
Professional1 year
EnterpriseUp to 7 years (you choose)

Accessing Logs

  1. Go to Settings → System Log
  2. Filter by date, person, or activity type
  3. Export for your records

🏥 HIPAA Compliance

For organizations that handle health info (PHI):

HIPAA Features

FeatureDescription
BAA AvailableBusiness Associate Agreement for covered groups
PHI EncryptionExtra encryption for health information
Access LoggingDetailed records of who looked at health info
Minimum NecessaryRole-based access limits who sees what
Breach NotificationSteps to follow if there's a security issue

Turning On HIPAA Mode

  1. Go to Settings → Company → Compliance
  2. Turn on HIPAA Compliance Mode
  3. Review and accept the extra terms
  4. Extra security controls turn on automatically

HIPAA Best Practices

🔏 Data Privacy

Data Ownership

Data Processing

AspectPractice
LocationData is processed in the United States
SubprocessorsOnly a few trusted partners help us
PurposeData is only used to provide the service

⏳ Data Retention

Data TypeRetention
Account DataKept while your account is active, plus 30 days
CommunicationsYou choose how long to keep them
Call RecordingsYou choose (90 days by default)
Audit LogsBased on your plan (90 days – 7 years)

🗑️ Data Deletion

When you delete data:

📤 Data Export

You can download your data anytime:

📜 Compliance Certifications

Current Certifications

CertificationStatus
SOC 2 Type IICertified ✅
HIPAACompliant (with BAA) ✅
GDPRCompliant ✅
CCPACompliant ✅

Compliance Reports

Request compliance documents:

Contact security@kayse.ai for compliance questions.

🛡️ Application Security

Secure Development

PracticeDescription
Code ReviewAll code is reviewed before it goes live
Security TestingRegular security checks
Dependency ScanningAutomatic scans for known problems
Penetration TestingYearly outside security tests

Vulnerability Management

ProcessDescription
MonitoringAlways watching for new issues
PatchingCritical fixes go out within 24–48 hours
DisclosureResponsible disclosure program

Security Headers

📡 Communication Security

🎙️ Call Recording Security

MeasureDescription
EncryptionRecordings are encrypted when stored
Access ControlOnly people with the right role can listen
RetentionYou set how long to keep them
DeletionSecurely deleted when time is up

💬 Message Security

ChannelSecurity
SMSSent through carrier-grade delivery
EmailEncrypted with TLS while sending
ChatEnd-to-end encrypted

🚨 Incident Response

Security Incident Process

  1. Detection — Automated tools spot the problem
  2. Assessment — We figure out how serious it is
  3. Containment — We stop it from getting worse
  4. Notification — We tell you within 72 hours
  5. Remediation — We find the root cause and fix it
  6. Review — We learn from it and improve

Reporting Security Issues

Found a security problem? Email: security@kayse.ai

We respond to security reports within 24 hours.

🔄 Business Continuity

Availability

MetricTarget
Uptime99.9% available
RTOBack up and running within 4 hours
RPONo more than 1 hour of data lost

🌐 Disaster Recovery

💾 Backups

TypeFrequency
DatabaseConstantly copying data in real time
Full BackupOnce a day
Backup TestingTested every month to make sure they work

✅ Security Best Practices

For Administrators

For Users

For API Users

⚙️ Security Settings

Options You Can Change

SettingLocation
2FA EnforcementSettings → Security
Session TimeoutSettings → Security
IP AllowlistingSettings → API
Password PolicySettings → Security
Audit Log RetentionSettings → Data Retention

📬 Contact

Security Team

Compliance Inquiries

📅 Updates

This security page is reviewed and updated every few months. Last updated: February 2026.