How We Process Your Data

Transparency in data processing is fundamental to our commitment to privacy. Learn exactly how we handle, protect, and process your information.

Data Processing Flow

1

User Input

You send a message or upload a file

2

Encryption

Data is encrypted in transit using TLS 1.3

3

Processing

AI processes your request in secure memory

4

Response

Encrypted response is sent back to you

5

Memory Clear

Conversation data is cleared from memory

Processing Stages

Data Collection

When you interact with Liati, we collect minimal necessary data

  • Account information during registration
  • Chat messages and AI interactions
  • Usage patterns and preferences
  • Technical data for service optimization

Data Security

All data is immediately encrypted and secured

  • End-to-end encryption in transit
  • AES-256 encryption at rest
  • Secure key management
  • Regular security audits

Processing

Data is processed in memory for AI responses

  • Real-time conversation processing
  • No permanent storage of conversations
  • Anonymized analytics aggregation
  • Performance optimization

Access Control

Strict access controls protect your data

  • Role-based access control
  • Multi-factor authentication
  • Audit logging of all access
  • Principle of least privilege

Data Retention Policies

Data TypeRetention PeriodPurposeStorage Location
Conversation Data
Not stored permanently
Real-time AI responsesMemory only
Account Information
Until account deletion
Service provisionEncrypted database
Usage Analytics
12 months (anonymized)
Service improvementAnalytics systems
Billing Records
7 years
Legal complianceSecure payment systems
Security Logs
30 days
Security monitoringLog management systems

Technical Safeguards

Encryption & Security

Data in Transit

  • • TLS 1.3 encryption
  • • Perfect Forward Secrecy
  • • Certificate pinning
  • • HSTS enforcement

Data at Rest

  • • AES-256 encryption
  • • Encrypted database storage
  • • Secure key management
  • • Regular key rotation

Infrastructure Security

Network Security

  • • Private cloud networks
  • • WAF protection
  • • DDoS mitigation
  • • Network segmentation

Access Control

  • • Multi-factor authentication
  • • Role-based permissions
  • • Audit logging
  • • Regular access reviews

Monitoring & Compliance

We maintain continuous monitoring of our data processing activities to ensure compliance with privacy regulations and to detect any security incidents promptly.

24/7
Security Monitoring
99.9%
Uptime SLA
<1s
Response Time

Questions About Data Processing?

Contact our Privacy Team for detailed information about how we process your data