Security Documentation
Comprehensive security information for enterprise evaluation and vendor risk assessment
Available Documentation
Access our security certifications and compliance documentation
SOC2 Type II Report
Our independent auditor's report on our security, availability, and confidentiality controls. Request access through our Trust Portal.
Request AccessData Processing Agreement
Our standard DPA covering GDPR requirements and data processing terms. Request access through our Trust Portal.
Request AccessTrust Portal
Real-time view of our security posture, certifications, and compliance status via our partner Dsalta.
Open PortalSecurity Overview
Our Security Commitment
At Time Machine AI, security is fundamental to everything we build. We understand that our enterprise customers trust us with sensitive training data, sales strategies, and employee performance information. This trust is not taken lightly.
Certifications & Compliance
| Certification | Status | Description |
|---|---|---|
| SOC2 Type II | Certified | Security, availability, and confidentiality controls audited annually |
| GDPR | Compliant | Full compliance with EU data protection regulations |
| CCPA | Compliant | California Consumer Privacy Act compliance |
| Data Encryption | Active | AES-256 for database files, TLS 1.3 in transit |
Data Protection
All customer data is protected using industry-leading security practices:
- Database Encryption: All database files are encrypted using AES-256 encryption.
- Encryption in Transit: All communications are secured using TLS 1.3, the latest transport layer security protocol.
- Data Isolation: Customer data is logically isolated using tenant-specific encryption keys and access controls.
- Backup & Recovery: Automated daily backups with geo-redundant storage and tested recovery procedures.
Access Control
We implement strict access controls to protect your data:
- Enterprise-Grade Authentication: Secure authentication with strong password policies and account protection.
- Multi-Factor Authentication: MFA required for all user accounts and enforced for administrative access.
- Role-Based Access Control: Granular permissions ensure users only access data they need.
- Session Management: Automatic session timeout and secure session handling.
Infrastructure Security
Our platform is built on enterprise-grade cloud infrastructure:
- Cloud Hosting: Hosted on Microsoft Azure with SOC2 certified data centers.
- Network Security: Web Application Firewall (WAF) and DDoS protection.
- Monitoring: 24/7 security monitoring with automated threat detection.
- Incident Response: Documented incident response procedures with defined SLAs.
AI & Data Practices
Time Machine AI leverages advanced AI technologies while maintaining strict data privacy:
- AI Technologies: We use Large Language Models (LLMs), video generation models, and voice models to power our interactive training platform.
- No Model Training on Customer Data: We never train our AI models on customer data. Your proprietary information remains yours.
- Tenant-Isolated Improvements: Data is used only to enhance experiences within each tenant. Customers benefit from improvements based solely on their own data.
- Data Privacy: Your training content, role-play sessions, and performance data are never shared across tenants or used to improve services for other customers.
Vendor Security Questionnaires
We regularly complete security questionnaires for enterprise customers including:
- SIG (Standardized Information Gathering)
- CAIQ (Consensus Assessments Initiative Questionnaire)
- Custom vendor assessment questionnaires
To request a completed questionnaire or submit your own:
Contact Security TeamNeed More Information?
Our security team is ready to answer your questions and provide additional documentation.