Data Privacy
At SeekBee, we take your data privacy and security seriously. Learn about our approach to protecting your information while providing powerful search and AI capabilities.
Our Approach
SeekBee's privacy-first approach is built on these core principles:
Your Data Remains Yours
We never claim ownership of your data. You maintain full control over what data is indexed, who can access it, and you can delete it at any time.
Secure Infrastructure
All data is encrypted in transit and at rest using industry-standard encryption. Our infrastructure is hosted on secure cloud providers with SOC 2 Type II certification.
No Credential Storage
We use OAuth for all integrations and never store your passwords or credentials. You can revoke access to any connected service at any time.
Granular Access Controls
You control exactly who can access what data with our detailed permission system. Set access at the organization, team, or individual level.
Transparent Policies
Our privacy policy and terms of service are written in clear, straightforward language. We're transparent about how we use your data and the limited circumstances in which we access it.
Compliance
We comply with GDPR, CCPA, and other privacy regulations. We provide tools to help you fulfill data subject requests and maintain your own compliance obligations.
How We Protect Your Data
SeekBee employs multiple layers of security to keep your data safe.
Technical Safeguards
- Encryption:
All data is encrypted in transit using TLS 1.3 and at rest using AES-256 encryption.
- Access Controls:
Multi-factor authentication, role-based access controls, and least privilege principles for all systems.
- Network Security:
Firewalls, intrusion detection systems, and regular vulnerability scanning protect our infrastructure.
- Monitoring:
24/7 monitoring for suspicious activities with automated alerts and response procedures.
Organizational Safeguards
- Security Team:
Dedicated security professionals who continuously monitor and improve our security posture.
- Employee Training:
Regular security awareness training for all employees and background checks for staff with access to sensitive systems.
- Third-Party Audits:
Regular security assessments and penetration testing by independent security firms.
- Incident Response:
Comprehensive incident response plan with regular drills and simulations to ensure readiness.
Compliance & Certifications
SeekBee maintains compliance with industry standards and regulations.
GDPR Compliant
Full compliance with the EU General Data Protection Regulation.
SOC 2 Type II
Certified compliance with SOC 2 Type II security, availability, and confidentiality principles.
CCPA Compliant
Compliance with the California Consumer Privacy Act requirements.
ISO 27001
In process for ISO 27001 certification (expected completion Q2 2024).
Privacy FAQ
Common questions about SeekBee's data privacy and security practices.
Does SeekBee store my passwords?
No. SeekBee uses OAuth for all integrations and never stores your passwords or credentials. When you connect a data source, you authenticate directly with that service (like Google or Microsoft) and grant SeekBee limited access permissions.
Can SeekBee employees see my data?
SeekBee employees do not have routine access to customer data. Access is strictly limited to specific support scenarios with your explicit permission, or when required by law. All access is logged and audited.
How does SeekBee use my data to train AI models?
By default, SeekBee does not use your data to train our AI models. We use your data only to provide the service to you. You can opt-in to contribute anonymized usage patterns (not your actual data) to help improve the service, but this is entirely optional.
What happens to my data if I cancel my subscription?
When you cancel your subscription, you have 30 days to export any data you wish to keep. After that period, all your data is permanently deleted from our systems, including backups (which are purged within 90 days).
How does SeekBee handle data subject requests?
SeekBee provides tools for workspace administrators to fulfill data subject requests (access, correction, deletion) for their users. For individual users, you can submit requests directly through your account settings or by contacting our privacy team.
Questions about our privacy practices?
Our privacy team is available to answer any questions you may have about how we protect your data.