Overview
At Rhetoric, our goal is to ensure the security of our software development processes and products is a top priority. This document outlines the key security protocols and assumptions we employ to protect all data, infrastructure, and users.
1. User Authentication
Strong Password Policies: We enforce strong password requirements, including complexity and length.
OAuth 2.0: For third-party integrations, we use OAuth 2.0 to ensure secure and seamless authentication.
2. Data Protection
Encryption: User data is encrypted both in transit (using TLS/SSL) to protect against unauthorized access.
User files uploaded to the Rhetoric system are stored for 7 days and then automatically deleted.
Small portions of text from user briefs are stored securely in the system database until the user/owner selects to delete a scored brief from the user interface. These text portions are visible only to the user/owner who uploaded them and are illustrative of text that the system suggests changing.
When a user deletes a scored brief from the user interface, all remnants of the brief, quotes, and scores are immediately removed from the system. If briefs have not been automatically deleted at the 7-day mark, a user-triggered delete will immediately delete the brief before the 7-day mark.
No data from uploaded briefs is used for any Artificial Intelligence (AI) training or modeling.
Data Anonymization: Sensitive user information is anonymized where possible to minimize risk in case of data breaches.
3. User Privacy
User Data: Rhetoric collects only first and last name, company, email, IP address, and role. No additional personal data are collected, and these data are never sold or transferred.
4. Account Security
Automatic Logout: Users are automatically logged out after a period of inactivity to prevent unauthorized access on unattended devices.
5. Application Security
Regular Security Updates: We regularly update our software to patch vulnerabilities and ensure protection against the latest threats.
Secure Development Lifecycle: Security is integrated into every phase of our software development lifecycle, from design to deployment.
6. Incident Response
User-Focused Incident Response Plan: Our incident response plan includes specific protocols for notifying and assisting users in case of a security breach.
Data Breach Notification: Users are promptly informed of any data breaches that may affect their personal information, along with steps they can take to protect themselves.
7. Third-Party Integrations
Secure APIs: Third-party integrations are secured through robust API security measures, including authentication, rate limiting, and encryption.
Vendor Security Assessments: We conduct security assessments for third-party vendors to ensure they meet our security standards and protect user data appropriately.
8. Continuous Improvement
Feedback Loop: We encourage users to report security concerns and provide feedback, which is used to continuously improve our security measures.
Regular Audits: Internal and external security audits are conducted to ensure ongoing compliance and identify areas for improvement.
By implementing these security protocols and assumptions, we aim to create a safe and secure environment for our users, protecting their data and privacy while ensuring a seamless and trustworthy experience on our software platform.
