Your comprehensive resource for security, compliance, privacy, and trust information about Unify platforms.
Unify implements comprehensive security measures to protect customer data throughout its lifecycle. Our security approach is built on industry best practices and zero-trust principles.
[Additional content about security architecture, security team, and ongoing security initiatives should be added here.]
Unify maintains compliance with industry standards and regulations relevant to our services. Below is our current compliance status and roadmap.
Unify undergoes annual SOC 2 Type II audits to verify our security, availability, processing integrity, confidentiality, and privacy controls.
Unify complies with all Family Education Rights and Privacy Act requirements where applicable.
Unify aligns with GDPR requirements for data protection and privacy for EU residents.
Unify complies with the California Consumer Privacy Act (CCPA) requirements.
Unify.CMS and Unify.AMS support compliance with OFCCP and DOL apprenticeship program requirements.
Unify supports compliance with FCC 47 CFR Part 90 for telecom workflow integrations.
Unify.CMS integrates with E-Verify for I-9 verification workflows.
Assessment in progress for state broadband operations support.
Readiness assessment planned for government contractor support.
Certification process planned for international standards alignment.
Compliance assessment planned for handling protected health information (PHI) where applicable.
Unify is committed to protecting your data and respecting your privacy rights. This section outlines our data handling practices. For more detailed information, please see our Privacy Policy.
Unify stores customer data in the following regions:
Customer data is retained according to our data retention policy. Upon request, we will delete customer data in accordance with applicable laws and our contractual obligations.
To request data deletion or submit other security, trust, and data-related requests, please use the form below.
Note: Submissions can be made for security reviews, trust information requests, data deletion requests, and other related inquiries in the Request Trust Information section.
We maintain a current list of subprocessors that handle customer data. See the Subprocessors section for details.
Unify maintains comprehensive logging and monitoring systems to detect and respond to security events. Logs are retained according to our retention policy and are used solely for security and operational purposes.
Request access to our standard Data Processing Addendum for review and execution.
Unify's infrastructure is designed for security, reliability, and scalability. This section provides an overview of our technical architecture.
Note: A detailed architecture diagram can be provided upon request for enterprise customers. Contact support@myunifyai.com for more information.
Unify platforms include comprehensive security controls to protect your data and ensure secure operations.
Comprehensive logging of system and user actions for security monitoring and compliance.
Support for MFA to enhance account security beyond passwords.
Restrict access to specific IP addresses or ranges for enhanced security.
Support for SAML 2.0 and OIDC for single sign-on authentication.
Configurable session timeouts and secure session handling.
Automated user provisioning and deprovisioning via SCIM protocol.
Rate limiting and throttling to prevent abuse and ensure fair usage.
Secure storage and management of API keys and credentials using industry-standard vaults.
Isolated sandbox environments for safe API testing and development.
Built-in data classification capabilities to identify and protect sensitive information.
Virus scanning and MIME type validation for all file uploads.
Unify.AI is built with security, transparency, and responsible AI practices at its core. This section outlines how we protect customer data in AI-powered features.
Unify.AI uses the Model Context Protocol (MCP) to securely manage AI model interactions:
AI agents operate within sandboxed environments to prevent unauthorized access:
Unify.AI uses the following model families (subject to change based on customer needs and availability):
Competitive Advantage: Unify.AI's agent store and orchestration layer provides enterprise-grade AI capabilities with built-in security and governance controls.
Unify maintains a comprehensive incident response program to quickly detect, respond to, and recover from security incidents.
Our security operations center (SOC) provides continuous monitoring of our systems and infrastructure to detect potential security threats.
Data breach or significant service disruption. Customer notification within 24 hours.
Potential data exposure or service degradation. Customer notification within 72 hours.
Limited impact or contained incident. Customer notification as appropriate.
Minor issues with no customer impact. Included in regular security updates.
Request access to our Incident Response Policy document (non-proprietary sections) for detailed information.
Unify conducts regular penetration testing to identify and remediate security vulnerabilities before they can be exploited.
Unify engages with reputable third-party security firms for independent penetration testing. Testing partners include:
Our penetration testing follows industry-standard methodologies including:
Enterprise customers can request access to our latest penetration test reports. Please contact us to request access.
Unify is committed to providing reliable, high-availability services. Monitor our system status and uptime metrics in real-time.
View real-time system status, historical uptime, and incident history on our status page.
Unify maintains the following uptime commitments (varies by service tier):
Planned maintenance is scheduled during low-traffic periods and communicated in advance. Maintenance windows are typically:
Subscribe to receive automated alerts about system status, incidents, and maintenance:
Access all legal documents, policies, and agreements in one place.
Current list of third-party subprocessors.
Request access to our SOC 2 Type II report.
Unify uses third-party subprocessors to provide our services. This list is updated regularly and customers are notified of material changes.
| Subprocessor | Purpose | Data Handled | Region | Date Added |
|---|---|---|---|---|
| Amazon Web Services | Cloud hosting and infrastructure | All customer data | US East, Virginia | 2023 |
| Microsoft | Cloud services and productivity tools | Customer data, email addresses, email content | US East, Virginia | 2023 |
| AirCall | Phone and communication services | Phone numbers, call data | US East, Virginia | 2023 |
| Unify.Docs | Document storage and management | Uploaded files, documents | US East, Virginia | 2023 |
| CheckR | Background verification services | Candidate information | US East, Virginia | 2023 |
| Stripe | Payment processing | Payment information | US East, Virginia | 2023 |
| OpenAI | AI model services | Data sent for AI processing | US East, Virginia | 2023 |
| Claude | AI model services | Data sent for AI processing | US East, Virginia | 2023 |
| USI LLM - Orion | AI model services (self-hosted) | Data sent for AI processing | US East, Virginia | 2023 |
Last Updated: 2023 | Notification Policy: Customers are notified of material subprocessor changes at least 30 days in advance.
Unify values the security research community and encourages responsible disclosure of security vulnerabilities.
We ask security researchers to follow responsible disclosure practices:
Unify will not pursue legal action against security researchers who:
Please report vulnerabilities to: support@myunifyai.com
Include the following information in your report:
Note: Unify may establish a formal bug bounty program in the future. Check back for updates.
Enterprise customers and prospects can request security documentation and complete vendor security questionnaires.
Request access to our latest SOC 2 Type II report. Access is provided through a secure portal with NDA requirements.
We support standard security questionnaires to streamline your vendor assessment process.
Security Contact: For all security-related inquiries, please contact support@myunifyai.com
Use the appropriate contact channel for your specific needs. Our team is ready to assist with security, privacy, and trust-related inquiries.
For security incidents, vulnerability reports, and security-related inquiries.
support@myunifyai.comFor privacy requests, data subject rights, and privacy-related questions.
support@myunifyai.comTo report abuse, violations of terms of service, or suspicious activity.
support@myunifyai.comFor enterprise customers - 24/7 incident response hotline (available upon request).
Contact your account manager for hotline access.