Here at Tonic.ai, we utilize the principle of least privilege to protect data. Tonic.ai employees will never access your customer data—and the Tonic platform doesn’t store that data either.
Rest assured that we take security seriously.
Our security controls include the following.
When we connect to customers' environments, we use least privilege, with access scoped only to what is needed to satisfy the control.
To restrict employee access, Tonic.ai uses the principle of least privilege, to ensure that employees have access only to what they need to perform their specific roles.
Tonic.ai uses an independent auditor to maintain a SOC 2 report, to ensure adherence to industry standards for security and privacy.
Tonic.ai engages a qualified assessor to complete an annual third-party static code analysis and manual penetration tests.
As part of every release, Tonic.ai uses a combination of:
Manual testing
Automatic unit and integration tests
Security scanning
Tonic.ai uses multiple logging and monitoring tools to ensure that the software we build and deploy is:
Free of defects
Configured securely
Tonic.ai employs staff who have industry knowledge and experience in:
Secure infrastructure
Application management
Risk
Operations
Tonic.ai uses centrally managed endpoint management solutions to ensure that all employee and BYOD devices:
Are configured securely
Receive proper updates
Remain compliant with Tonic.ai requirements while in use
Our annual security training covers:
Security hygiene
Phishing
Data protection
New threats that employees might encounter
General best practices
Tonic AI Trust Documents provides access to:
Tonic.ai policies
SOC 2 reports
Penetration tests
HIPAA attestations
Other security documentation
Tonic Cloud is Tonic's software-as-a-service (SaaS) offering that provides Tonic.ai's applications in secure deployments, which removes the need to manage infrastructure.
Tonic.ai understands how important it is to protect your information, which is why we've gone above and beyond to establish a robust security posture for our cloud-based products:
Tonic Structural
Tonic Ephemeral
Tonic Textual
Tonic.ai exceeds both the stringent controls mandated by the AICPA SOC 2, and the security and privacy controls of the US Health Insurance Portability and Accountability Act (HIPAA).
The cornerstone of our secure environment is a meticulously designed security architecture and infrastructure. This section delves into the core principles that guide our infrastructure design, including:
Secure deployment practices
Robust data encryption at rest and in transit
Comprehensive backup strategies
Rigorous operational procedures
This comprehensive approach ensures the confidentiality, integrity, and availability of your data throughout its lifecycle within our system.
We built our cloud-based products from scratch using a three-tier architecture model.
Three-tier architecture is a well-established software application architecture that organizes applications into the following tiers or layers:
Presentation
Application
Data
Communication between tiers is strictly defined on a default-deny basis.
This makes it more difficult to reach the data layer, which creates a layered defense that significantly reduces the risk of successful attacks and data breaches.
We store our core application data in Amazon Relational Database Service (Amazon RDS) instances.
Amazon RDS uses an Advanced Encryption Standard (AES) algorithm in Galois/Counter Mode (GCM) with 256-bit secret keys. This industry-standard encryption method uses a unique key to scramble the data, which renders the data unreadable without authorization.
Regular backups are critical to any data protection strategy.
We use the same AES-256 encryption standard to encrypt our backups, which ensures additional peace of mind in case of unforeseen events.
We generate and rotate backups automatically to ensure that data is retained only as long as needed for disaster and business continuity.
An extra layer of security is applied through application-level encryption of files that are stored in the cloud. This adds another level of protection for sensitive documents and data that are stored in the application.
Tonic Structural and Textual encrypt any uploaded data before it is stored in the database.
With this extra layer of protection:
Database administrators cannot view the data
The data does not appear in other tools that might connect to the data
The data cannot be used from manual backups
Tonic.ai uses next-generation anti-malware software on all of its cloud servers. The software uses both:
Signature-based scanning to identify known malware
Behavioral analysis to detect unusual processes and zero-day exploits
Tonic.ai uses both regular scanning of instances and real-time protection to catch potential malware that might be hidden deep in inactive files or archives. It also uses real-time protection to monitor system activity and analyze files, programs, and network traffic.
A robust network infrastructure is the foundation of our secure communication architecture.
This section details the key components that safeguard data transmission, including:
Firewalls for access control
TLS encryption for data confidentiality
Load balancing for optimal performance
Comprehensive network monitoring for continuous vigilance
This combination ensures secure and reliable communication channels for all data transfers within our system.
Our cloud applications use TLS 1.3 and 1.2 to enforce the encryption of ingress traffic. Tonic Structural uses AWS Application Load Balancing security policy ELBSecurityPolicy-TLS13-1-2-2021-06. For details about the supported ciphers, go to https://docs.aws.amazon.com/elasticloadbalancing/latest/application/create-https-listener.html
By default, egress traffic from our cloud applications also uses TLS encryption to communicate between the application and customer resources.
To maintain compatibility with different database vendors and versions, our cloud offerings are more permissive on the protocols and ciphers that are allowed for egress traffic.
Our cloud applications use both stateful and stateless firewalls that are configured to default-deny all traffic other than traffic that is explicitly expected between different systems on specific ports.
These firewalls also track and monitor the state of active network connections. They analyze incoming traffic and look for potential traffic and data risks.
We use web application firewalls to block request patterns that are associated with discovery and exploitation of vulnerabilities. The firewalls also use up-to-date commercial threat intelligence to block sources that are associated with botnets or other known threat actors.
Our cloud applications use high-availability load balancers to balance traffic over multiple instances. This ensures that our service is available even if a single piece of hardware fails.
To continuously monitor our services, our cloud applications use intrusion detection software that incorporates:
Anomaly detection
Machine learning
Behavioral modeling
Commercial threat intelligence
A robust Identity and Access Management (IAM) system lies at the core of our secure environment.
This section delves into the processes that govern how users are:
Identified (authentication)
Authorized to perform specific actions (authorization)
Managed throughout their time with our system (user lifecycle)
Monitored for activity (auditing)
These practices ensure that only authorized users have access to the appropriate resources, and that all actions are traceable for enhanced security and accountability.
Tonic.ai uses a centrally managed Identity Provider to provision and manage authentication and authorization to cloud resources. This allows Tonic.ai to enforce authentication policies that include:
Strong passwords
Multi-factor authentication
Geographic and risk-based access
To access administrative resources (user interfaces and dashboards) and network resources, Tonic.ai staff who have roles that grant them access to our cloud infrastructure must use our identity provider to authenticate.
Tonic.ai maintains detailed audit logs of our administrators’ access to cloud resources. This includes:
Their sign-ins
Type of access (for example, console or VPN)
The type of device used
The IP address of the connection
These logs are immediately transferred to a separate AWS account that only security and auditing staff can access.
The security of your data is paramount.
This section dives into the comprehensive security assessments that we conduct throughout the development lifecycle and ongoing operation of our application. We use a multi-layered testing approach to identify and address vulnerabilities before they can be exploited.
During the Tonic.ai software development lifecycle (SDLC), the pull request process includes static application security testing (SAST). This ensures that changes to our codebase do not introduce potential vulnerabilities.
As part of the Tonic.ai SDLC, we use commercial and open-source container scanning of our finished builds. This ensures that Tonic.ai does not release code with known exploits into our cloud environments.
Within our cloud environment, to identify suspicious network activity and prevent leaks of sensitive data, Tonic.ai uses:
Network threat detection
Next-generation anti-malware scanning
Data loss prevention software
To proactively discover security weaknesses in our applications and networks, we leverage external manual penetration testing, where ethical hackers simulate real-world attacks to identify and remediate vulnerabilities.
In our commitment to safeguard your data and to maintain the highest security standards, we undergo regular audits and adhere to recognized certifications.
This section details our compliance framework, outlining the independent assessments and certifications that verify the security and privacy controls that we use to protect your information.
Tonic.ai undergoes an annual SOC 2 audit that is performed through an independent auditing firm. The audit verifies our adherence to industry-standard security controls that safeguard customer data.
SOC 2 audits focus on a set of criteria that include security, availability, processing integrity, confidentiality, and privacy.
Our cloud infrastructure has gone through the AWS Foundational Technical Review to ensure that our solution:
Is well-architected
Follows industry best practices
Follows Amazon’s guidance for using their cloud infrastructure securely
Tonic.ai is committed to meeting and upholding the principles of the GDPR.
Our cloud applications use industry standard contractual and technical controls to meet GDPR's strict privacy requirements.
Tonic.ai monitors and ensures that our sub-processors meet the same legal and technical standards that we employ.
Structural uses industry-standard administrative and technical controls to meet HIPAA's strict security and privacy requirements.
Each Tonic.ai application has different core functionality and different security risks.
Because each application is developed independently, each application has different security features. The following documents cover the specific features for each application.
StructuralTextualEphemeralThe Tonic Structural platform creates safe, realistic datasets to use in staging environments or for local development. Structural can be deployed either:
Self-hosted by the customer
In Tonic Cloud, which is a managed service that Tonic.ai provides
For comprehensive Structural feature documentation, go to the Structural User Guide.
The Structural application saves log files that can be used to:
Diagnose issues
Troubleshoot bugs
Help to identify when performance can be improved
Generally improve Structural and its features
On-premise customers can aggregate these logs into their logging solution or SEIM for analysis and monitoring.
They can also share logs can also be shared with Tonic.ai so that our staff can help to handle errors.
How to share logs with Tonic.ai
Structural supports a variety of user roles that allow customers to assign end-users the least privileges required.
Structural produces data products that might not require users to access the Tonic application at all.
How to grant access to Structural workspaces
Structural supports a variety of external identity providers that allow customers to:
Centrally manage users
Define authentication criteria to log in to Structural
Structural supports:
AWS SSO
Azure Active Directory
Duo Security SSO
Google Workspace SSO
Keycloak
Okta
PingID
Other SAML 2.0 compliant identity providers
Single sign-on (SSO) in Structural
The Structural application hashes all user passwords when stored.
The Structural application encrypts datastore credentials using customer-provided encryption keys.
Tonic Textual provides a single tool to allow you to put your file-based data to work for you.
You can also use Textual to do simple redaction and synthesis of sensitive values, to produce files in the same format to use for development and training. Each original file becomes an output file in the same format, with the sensitive values replaced.
Textual can be deployed either:
Self-hosted by the customer
In Tonic Cloud, which is a managed service that Tonic.ai provides
For comprehensive feature documentation for Textual, go to the Textual User Guide.
The Textual application saves log files that can be used to:
Diagnose issues
Troubleshoot bugs
Help to identify when performance can be improved
Generally improve Textual and its features
On-premise customers can aggregate these logs into their logging solution or SEIM for analysis and monitoring.
Customers can also share logs with Tonic.ai so that our staff can help to handle errors.
For self-hosted instances, Textual supports a variety of external identity providers that allow customers to:
Centrally manage users
Define authentication criteria to log in to Textual
Textual supports:
Azure Active Directory
Github
Google Workspace SSO
Okta
Single sign-on (SSO) for Textual
The Textual application hashes all stored user passwords.
Tonic Ephemeral allows you to create temporary databases that you can use for demos, development, and testing.
For comprehensive feature documentation for Ephemeral, go to the Ephemeral User Guide.
The Ephemeral application saves log files that can be used to:
Diagnose issues
Troubleshoot bugs
Help to identify when performance can be improved
Generally improve Ephemeral and its features
On-premise customers can aggregate these logs into their logging solution or SEIM for analysis and monitoring. Customers can also share logs with Tonic.ai so that our staff can help to handle errors.
For self-hosted instances, Ephemeral supports external identity providers that allow customers to:
Centrally manage users
Define authentication criteria to log in to Ephemeral
Ephemeral supports:
Google Workspace SSO
Okta
Single sign-on (SSO) on Ephemeral
The Ephemeral application hashes all stored user passwords.
If you believe you’ve found something in a Tonic.ai product that has security implications, email your findings to security@tonic.ai.
To report security findings over a secure channel, use the following key to encrypt your message.
Tonic.ai currently does not pay bounties for unsolicited security findings.
Tonic.ai collects usage, license, and error data from both cloud and self-hosted applications.
Tonic.ai collects some analytic, account management, customer support, and debugging data from the each Tonic.ai application. Tonic.ai uses Amplitude, Sentry and Amazon Web Services to receive and process telemetry. Telemetry sharing is required.
For information about data that is collected by Tonic Structural, go to https://docs.tonic.ai/app/admin/tonic-monitoring-logging/tonic-data-collection
TonicAI, Inc., dba Tonic.ai (“Tonic,” “us,” “we,” or “our”) provides this privacy policy (the “Privacy Policy” or “Policy”) that describes how we collect, use, and disclose your information. This Policy applies our website www.tonic.ai and related subdomains, any other website operated by Tonic.ai that links to this Policy (together, “Websites”), and our data collection practices when you acquire, download, install, access, or use certain online services offered by Tonic.ai, including where this Policy is incorporated by reference (our “Online Services”). Specifically, this policy describes the information, including personal information, we may collect from you, about you, or that you may provide to us when you interact with us through our Online Services or with Tonic.ai in-person (i.e., “offline”) (collectively, the “Tonic Services”) and how we use, protect, and share such information.
Please note that the Tonic Services do include, and this Policy does apply to, services provided by Tonic.ai to you (or your organization) in your or your organization’s own online environment pursuant to a separate agreement between you and Tonic.ai.
Please read this document carefully. If you do not agree with this Policy, your choice is not to use Tonic Services. By accessing or using the Tonic Services, submitting information to Tonic, and or acknowledging your agreement to Tonic’s Terms and Conditions or Click-Through Terms of Use, you agree to this Policy. This Policy may change from time to time. We will post the updated policy at this address (or an address we later designate) and update the ”Last Updated” date on this document. Your continued use of Tonic Services after we make changes to this Policy is deemed to be your acceptance of any such changes, so please review this page periodically for updates.
The chart below lists the categories of personal information that we may collect from or about you through the Tonic Services:
Categories of personal information we collect and how we collect itIdentifiers. This may include a real name, alias, address, email address, phone number, online identifier, IP address, account username and password, job title, or other similar identifiers.
Internet and network information. This may include cookies, information about your interaction with a website, application, service or advertisement, such as browsing history and how you use your account.
Device information. This may include the operating system of your device, device identifier, the type of device you are using[, or your geolocation information.]
Order information. This may include information about what you order, shipping, delivery, returns, product complaints, or warranties.
Payment and credit information. This may include your credit or debit card information, banking information, information about your payment transaction, or other financial information you provide us.
Other information you submit to us. This may include requests or communications you submit to us, including emails, ratings, or customer service and sales call recording.
Research or survey information. This may include survey results, social media data, and other information about your participation in consumer research.
Inferences we draw about you. This may include information about your preferences, characteristics, predispositions, behavior, or other trends that help us identify which products you may be interested in.
We may also collect, use and share non-personal information. And, we may use or share information that we have collected that has been de-identified or anonymized so that it does not personally identify you.
We collect information from or about you through the following methods:
When you provide information to us voluntarily, through the Online Services, including by filling out forms, registering for an account, purchasing our products or services, signing up for marketing communications, requesting information about our products or services, or any other data entry method in the Online Services;
When you register for or attend a virtual or “offline” event;
When you visit our offices, including to identify you as a visitor and allow you access to restricted areas;When you provide us information through a survey, contest, or promotion, or through other marketing research or initiatives;
When you interact with us on social media, or with our advertisements online;
When you communicate with us, including through email, chat, or other online or offline methods, including for customer service or providing feedback;
In any other way we describe while providing the Tonic Services; and
Automatically, when you interact with or visit the Tonic Services, through the use of cookies, web beacons, JavaScript, logging, and other automated data collection means. For more information, see the section entitled “Automated and Third Party Data Collection,” below.
We also collect information about you from the following sources:
Our service providers;
Publicly available and governmental records, including social media networks, websites, blogs, and forums;
Other users of the Tonic Services; and
Marketing partners and other third parties.
We use information that we collect from or about you in the following ways:
To provide you with the Tonic Services, including to confirm, complete, and service any transactions with you;
To interact with you, including through email, customer support, and contact requests, or to resolve problems and disputes;
To send you marketing communications about our products, events, and promotions, including through newsletters, social media, and other channels
To comply with or enforce our legal obligations or rights, including to comply with court orders, subpoenas, or other legal process or lawful requests
To ensure the security and availability of Tonic Services, and to enforce our terms;
To develop, improve, and measure the effectiveness of the Tonic Services and our marketing efforts;
To improve our user experience;
To provide certain advertisements and content, both on and off our Websites, in some cases based on your preferences or interests;
To facilitate payments, including for Tonic Services;
To fulfill any purpose for which you provided it;
In any other way that we provide notice of or where you have provided your consent.
We may share information about you with the following categories of individuals and entities or in the following scenarios:
With our service providers and subcontractors, who perform services on our behalf to operate our business and the Tonic Services, including service providers that help us to run our Websites and Online Services, process payments, communicate or market to or with you, secure the Tonic Services, and analyze the Tonic Services;
With a buyer, successor in interest, or any other party involved in a merger, acquisition or other sale or transfer of all or some of the Company’s assets, equity or business or any similar transaction, or as part of a bankruptcy, liquidation, dissolution or similar proceeding, as well as advisors, lawyers, accountants and other third parties that may assist in the negotiation, review, and consummation of any such transaction or proceeding;
When we believe it is necessary to enforce or apply this Policy or any other agreement with you, and to protect the rights, property, or safety of Tonic or its employees, users, or others;
When the information has been aggregated, anonymized, or de-identified. In these situations, we do not disclose any information that could be used to personally identify you;
When you direct us to share your information with a third party, or otherwise provide your consent to share your information;
For any other reason that we have properly notified you about at the time we collect the information; and
Where we are required to do so by law, including as the result of a court order, legal process, subpoena, or other lawful request, or where we otherwise have a legal obligation to do so.
When we provide personal information to our service providers, we use reasonable efforts to ensure they comply with applicable privacy laws.
Like most technology companies, we (and our service providers and certain third parties) collect information about you automatically, including when you interact with Tonic Services. We collect this information through a variety of technologies, which we explain below:
Cookies - A cookie is a small text file that is sent to your browser when you access a website. There are two types of cookies, session cookies and persistent cookies. A session cookie is available and exists only during the course of the browser session. Closing the browser or logging off will invalidate the session cookie. Persistent cookies, similar to their name, last for a longer period of time, from hours, days, or weeks, and remain on your hard drive (or other storage medium) and record or disclose information about you and your interactions with websites and services. For example, cookies are used to retrieve information that you have previously entered (to allow you not to have to re-enter it), analyze the usage of a website, or track users across websites or services. You can often decide whether and what types of cookies you are willing to accept through your browser’s settings or through third party products that may manage, disclose, or block cookies, like browser plugin-ins or other software.
Web beacons (also known as pixels, internet tags, or clear gifs) – These are tiny graphics on a web page (or in an email) that are used to track pages, viewed, messages opened, or other information. They can provide certain information, including IP address and browser type, or other information about interactions with a website or service.
Embedded Scripts – These are also bits of code on a website or service that measure how a user interacts with a website, application, or service; the scripts are often in JavaScript, a common programming language.
Tonic also collects information automatically about you through logging that is standard on websites. Typically, website logs include your IP address, device type, browser type, access time, and the URL where you came from or where you are going.
Certain service providers and third parties collect information about you when you are interacting with the Tonic Services, including through the automated methods described above. We also use other third parties or service providers to assist us in operating our business and they may receive or store your personal information. Because we value your privacy, we want to be transparent about this data collection, provide you further information, and in some cases provide you methods to opt-out of or control this data collection.
Tonic’s Websites and Online Services include functionality, cookies and other automated data collection from Facebook and LinkedIn. The cookies and other data collection by LinkedIn and Facebook allow us to place ads on certain social media websites, measure your engagement with those ads, tailor ads to you, measure your ad conversion, and provide us information about your interactions with us on social media. There is information in the table below, if you wish to opt-out of data collection by LinkedIn and Facebook. The following list includes the service providers and third parties currently used by Tonic as of the date of this Policy. The list is subject to change at any time.
Amplitude
We use Amplitude to analyze and optimize the user experience on our site.
Learn more about Amplitude’s privacy practices: https://amplitude.com/privacy
Ashby
We use Ashby as an applicant tracking system to manage our recruitment process and hiring activities.
Learn more about Ashby's privacy practices: https://www.ashbyhq.com/resources/privacy
With respect to Facebook, we use Facebook Pixel to measure the effectiveness of our advertising by understanding the actions you may take on our website. Facebook Pixel assists us in customizing our advertising and serving you ads on your social media based on your browsing behavior.
You can learn about Facebook’s privacy practices at www.facebook.com/about/privacy/, and you can opt out of the collection of your data by Facebook Pixel or the use of your data for the purpose of displaying Facebook ads by visiting www.facebook.com/settings?tab=ads (you will need to log into your Facebook account)
FullStory
We use FullStory understand the digital user experience so we can improve our site.
Learn more about FullStory’s privacy practices: https://www.fullstory.com/legal/privacy-policy/
G2 Crowd
We use G2 Crowd to collect and manage customer reviews and ratings to improve our products and services.
Learn more about G2 Crowd's privacy practices: https://legal.g2.com/privacy-policy
We use Gong.io for visibility into customer interaction and go-to-market data.
Learn more about Gong.io’s privacy practices: https://www.gong.io/privacy-policy/
Google Analytics
Like many websites, we use Google Analytics to gather statistics from our Websites and Online Services. Google Analytics uses a browser cookie for statistical analysis related to your browsing behavior on our Websites and Online Services.
If you choose, you can opt out by turning off cookies in the preferences settings in your browser or download and install Google Analytics Opt-out Browser Add-on at http://tools.google.com/dlpage/gaoptout. For more information on Google Analytics, please visit http://www.google.com/analytics.
Google Tag Manager and Search Console
We also use other services of Google, like Tag Manager and Search Console, to assist in search engine optimization and advertising effectively.
Learn more about Google’s privacy practices: https://policies.google.com/privacy
Heap Analytics
We use Heap Analytics for understanding our customer’s use of our site so we can make our site better.
Learn more about Heap Analytics’s privacy practices: https://heap.io/privacy
Hotjar
Helps Tonic AI understand their users' behavior and preferences. By providing visual insights into user interactions
Hotjar’s privacy policy practices can be found here https://www.hotjar.com/legal/policies/privacy/
HubSpot
We use HubSpot for marketing automation and as part of our cybersecurity protocol.
Learn more about HubSpot’s privacy practices: https://legal.hubspot.com/privacy-policy
Intercom
We use Intercom as a customer communication platform to provide support, engage with users, and gather feedback.
Learn more about Intercom's privacy practices: https://www.intercom.com/legal/privacy
LeadIQ
We use LeadIQ to find and capture contact information for potential sales prospects.
Learn more about LeadIQ's privacy practices: https://leadiq.com/legal/privacy-policy
LeanData
We use LeanData to manage and route leads efficiently, ensuring they reach the appropriate sales representatives.
Learn more about LeadData's privacy practices: https://www.leandata.com/privacy/
With respect to LinkedIn, we use the LinkedIn Insights Tag to retarget our website visitors and learn insights about your interactions with our LinkedIn advertisements.
Learn more about LinkedIn’s privacy practices at www.linkedin.com/legal/privacy-policy, and you can opt out of LinkedIn Insights Tag at www.linkedin.com/psettings/
Microsoft Clarity
Microsoft Clarity and Microsoft Advertising captures how you use and interact with our website through behavioral metrics, heatmaps, and session replay to improve and market our products/services. Website usage data is captured using first and third-party cookies and other tracking technologies to determine the popularity of products/services and online activity. Additionally, we use this information for site optimization, fraud/security purposes, and advertising.
For more information about how Microsoft collects and uses your data, visit the Microsoft Privacy Statement
Outreach
We use Outreach as a sales engagement platform and for sales automation.
Learn more about Outreach’s privacy practices: https://www.outreach.io/privacy-policy
Salesforce
We use Salesforce for customer relationship management, including marketing automation and analytics.
Learn more about Salesforce’s privacy practices: https://www.salesforce.com/company/privacy/
Syft
We use Syft to analyze our software supply chain, ensuring the security and compliance of third-party components.
To learn more about Syft's privacy practices: https://www.syftanalytics.com/privacy-policy
Typeform
We use Typeform to support online form and survey building.
Learn more about Typeform’s privacy practices: https://www.typeform.com/ (Terms & conditions link)
Webflow
We use Webflow for website development.
Learn more about Webflow’s privacy practices: https://webflow.com/legal/privacy
X (formerly Twitter)
We use a cookie from X to integrate and share features for social media and store information about how the user uses the website, for tracking and targeting.
Learn more about Twitter’s privacy practices: https://help.x.com/en/rules-and-policies/x-cookies
Youtube
We use Youtube for video sharing and marketing.
Learn more about Youtube’s privacy practices: https://www.youtube.com/howyoutubeworks/our-commitments/protecting-user-data/
Zapier
We use Zapier to automate tasks and workflows between different applications we use, improving efficiency and productivity.
Learn more about Zapier's privacy practices: https://zapier.com/legal/data-privacy
We use Zoom as a conferencing solution.
Learn more about Zoom’s privacy practices: https://www.explore.zoom.us/en/privacy/
In addition to the listed service providers above, all sub-processors listed in our Data Processing Agreement may process personal information as bound by that agreement.
To learn more about or opt out of third party data collection on the Internet, generally, Tonic recommends you visit the following websites. Digital Advertising Alliance Consumer Choice Tool. Visit https://optout.aboutads.info/ to opt-out of ads from companies that participate in the DAA. Network Advertising Initiative. Visit https://optout.networkadvertising.org to opt-out of certain interest based advertising from participating NAI members. Please note that when you opt-out at the websites above, and in general, the opt-out is effective only for the device that you use to opt-out. It will not prevent data collection or targeted ads for other devices that you use – you will need to opt-out on each device. Additionally, certain opt-outs require that a cookie be placed on your device to record your preference. At this time, we do not support “Do Not Track” preferences that may be available in your browser.
Certain privacy laws, including those in Nevada and California, require that we disclose whether we sell your personal information to any third parties. These laws may differ in the definition of what constitutes “selling” personal information. Nevertheless, Tonic is happy to disclose that:
Tonic does not sell your personal information to any third party for monetary consideration.
Depending on your location and applicable law, you may have certain rights regarding your personal information. These rights may include the right to access personal information that Tonic has about you, the right to request that Tonic delete personal information about you, and the right to correct any errors in any personal information Tonic maintains about you. If you wish to exercise these rights, please contact us using the methods described below. If you do not wish to receive further non-transactional, marketing emails from us, you may opt-out by clicking the “unsubscribe” link in any such emails or contacting us using the methods described below. You may correct or update information that we collect about you by contacting us. If you make a request as described above (except with respect to e-mail opt-outs), we will verify your identity before honoring any such request, which may involve asking you to provide or confirm certain information about you. We engage in verification where required by law, or where we believe it is necessary to protect your privacy and prevent fraud or impersonation. In certain circumstances, you may also be able to make a request through your agent; any such request may also involve a verification process. You can opt-out of or control certain data collection through the Tonic Services, including automated data collection, as described above in the section titled “Automated and Third Party Data Collection.” You can also control what data is collected about you by limiting the information that you provide to Tonic, taking advantage of settings within your web browser or device that relate to privacy, or using software or other services or websites that help to protect your privacy or inform you about data collection practices.
Tonic Services are offered and available to users who are 18 years of age or older. Tonic Services are not directed to children under 13. If you learn that your minor child has provided us with personal data without your consent, contact us. This Privacy Policy does not apply to any data collection that occurs on any services or websites that are not Tonic Services, including websites that you may reach by clicking on a link through the Tonic Services. We encourage you to read the privacy policy of all websites that you visit. The privacy, safety and security of your information also depends on you. You are responsible for keeping any password to the Tonic Services confidential and secure, and we encourage you to always use good cybersecurity and privacy hygiene. To help protect the privacy of data we collect through the Tonic Services, we employ measures designed to protect your personal information. However, you should keep in mind that the Services are run on software, hardware and networks, any component of which may, from time to time, require maintenance or experience problems, or be attacked by third parties. Although we do our best to protect your personal information, we cannot guarantee the security of personal information transmitted to or through the Tonic Services. We retain your data as long as we are providing Tonic Services to you. Even after we stop providing Tonic Services directly or indirectly to you, we may keep your data in order to comply with our legal and regulatory obligations, as well as our tax, accounting, and financial reporting obligations. In all cases where we keep data, we do so in accordance with any limitation periods and records retention obligations that are imposed by applicable law. Tonic is based in the United States. To provide the Tonic Services, we or our service providers may process personal information in the United States, or in other locales across the globe. If you are not a resident of the U.S., you hereby consent and agree that we (and our service providers) may collect, process, use, transfer, and store your information, as discussed in this policy, outside your resident jurisdiction. Please be aware that United States law and the laws of other countries where we may store and process your information may offer different levels of protection for information than may be available in your country, and some of these locales may have been deemed to offer inadequate protection under certain laws.
Please contact us with any questions or concerns about your privacy, or to exercise any of rights identified above, where applicable. If you have a disability and need to receive this privacy policy in a different format, please let us know.
E-mail: privacy@tonic.ai Mail: Tonic AI, Inc. 325 9th St. San Francisco, CA 94103 Telephone: +1 415-340-0330 Please note: you also have the right to make a complaint directly to the applicable data protection or other regulatory agency if you believe your privacy rights have not been respected.