Privacy, Security & Compliance Are Core to Our Platform

Platform compliance

  • HIPAA

    HIPAA

    Health Insurance Portability and Accountability Act

  • ISO 27001

    ISO 27001

    ISO 27001:2013 Certification

  • ISO 27018

    ISO 27018

    ISO 27018:2019 Certification

  • SOC 2 Type II

    SOC 2 Type II

    SOC 2 Type II Compliant

Secure Platform Framework

Our platform supports secure, user-level authorization through industry-standard Single Sign-On (SSO) mechanisms. Company users can access their bot projects and integrations using Google SSO, Microsoft SSO, ADFS, and Azure AD. Additionally, at the bot level, we offer support for AD, LDAP, SAML, and OAuth2 for seamless authentication and security.

We provide robust role-based access permissions, allowing administrators to configure granular access levels for various roles such as developer, admin, tester, engagement manager, and analytics expert. Depending on assigned permissions, users can manage workflows, integrations, databases, bot training, intent mapping, and other critical platform components.

ammie.ai enforces strict password complexity requirements and uses advanced encryption standards to securely store all credentials and sensitive information.​
Secure Password and Credential Management

Data Integrity and Network Security

Data Integrity and Network Security

ammie.ai services and data are distributed globally, emphasizing the critical importance of data resilience. Our platform is architected with robust disaster recovery capabilities, utilizing an N+1 redundancy model across multiple availability zones to ensure continuous operation even if a data center experiences failure.

Data transmitted to and from our platform is secured using end-to-end encryption protocols (HTTPS). Access controls are rigorously maintained with encryption keys stored in secure vaults, which are rotated quarterly to uphold stringent security standards.​

Our infrastructure is contained within a dedicated Virtual Private Cloud (VPC), safeguarded by network access control lists (ACLs) that block unauthorized access attempts and secure our internal network from external threats.