Archer AI is designed to help you work smarter while keeping your data secure. We built it with privacy and safety in mind, so you can use its features confidently, knowing that your workspace data, permissions, and personal information are protected.
Here’s a breakdown of the key security and privacy practices.
Q. Does Archer have visibility into data outside my workspace?
A. No. Archer is confined to your authenticated workspace and follows the same authorization controls as the rest of the platform. Cross-organization data access is not possible.
Q. How are team and account permissions handled?
A. Archer respects all existing user and workspace restrictions. When a user is limited to specific connected accounts, Archer can only reference that permitted subset and cannot expand access.
Q. Is chat content used to train AI models?
A. No. Conversations are not used for training. AI providers operate under configurations and commercial terms that prohibit data collection for model improvement.
Q. Can conversations be removed from the system?
A. Yes. Users may delete chats at any time. Once deleted, the associated messages are permanently removed from storage.
Q. What types of changes can Archer perform?
A. Archer’s actions are intentionally constrained. It may create reports or post groups but cannot alter settings, permissions, billing, or change permissions.
Q. Who can view my conversations?
A. Chats remain private to the user within the interface. Limited administrative access exists solely for operational support, troubleshooting, and quality assurance.
Q. What happens if the AI service experiences downtime?
A. The system attempts to use a backup provider if the primary service is unavailable. If no providers are reachable, a notification is shown while workspace data remains unaffected.
Q. Does Archer access social platform credentials or tokens?
A. No. Archer does not interact with login details, OAuth tokens, or authentication. It only accesses analytics data through the secure platform data layer.
Archer AI is built with security and privacy at its core. Access is governed by workspace and user permissions, actions are deliberately limited, and sensitive credentials remain protected. These safeguards ensure you can use Archer confidently while retaining full control over your data and settings.
