Security & Privacy
In-depth documentation on what Speak AI does to secure your data.
By Speak1 author43 articles
Security overview: your top questions answeredQuick answers to the most common security questions: where is my data stored, is Speak HIPAA compliant, and do you train AI on my data.
What Does Speak Do For Security?How does Speak protect data, ensure confidentiality, encrypt information, select server locations and more.
Information Security Program PolicySpeak AI information security program policy establishing our overall security framework, governance, and accountability.
Incident Reporting and Response PolicySpeak AI incident reporting and response policy covering how we detect, respond to, and recover from security incidents.
Access Management PolicySpeak AI access management policy covering how we control and audit access to systems, data, and infrastructure.
Network Security PolicySpeak AI network security policy covering firewall rules, intrusion detection, and network access controls to protect your data.
Third-Party Security PolicySpeak AI third-party security policy for vetting, monitoring, and managing the security of our vendors and service providers.
Human Resource PolicySpeak AI human resource security policy covering employee screening, training, and security awareness requirements.
Password PolicySpeak AI password policy requiring strong, unique passwords and multi-factor authentication to protect user accounts.
Encryption PolicySpeak AI encryption policy covering data-at-rest and data-in-transit encryption standards for protecting your information.
Service Continuity Policy / Business Continuity PolicySpeak AI service continuity and business continuity policy ensuring platform availability and disaster recovery preparedness.
Change Management PolicySpeak AI change management policy and procedures for controlled, documented updates to our systems and infrastructure.
Log Management PolicySpeak AI log management policy covering how we collect, store, and analyze system logs for security monitoring and compliance.
Vulnerability Management PolicySpeak AI vulnerability management policy covering how we identify, assess, and remediate security vulnerabilities in our systems.
Physical Security PolicySpeak AI physical security policy for our data centers and office locations. Covers access controls and environmental safeguards.
Asset Management PolicyThis policy establishes guidelines for the effective management and security of Speak AI Inc.'s ("Speak AI") physical and digital assets.
Data Classification PolicySpeak AI data classification policy covering how we categorize and handle different types of information based on sensitivity levels.
Business Continuity PlanThis policy outlines the process and frequency for testing Speak AI’s Business Continuity Plan (BCP).
Disaster Recovery PlanThe frequency and procedures for testing Speak AI’s Disaster Recovery (DR) Plan to ensure that Speak AI can recover critical IT services.
Information Classification PolicyThe purpose of this policy is to establish a framework for classifying and protecting information assets at Speak AI Inc.
Pandemic & Infectious Disease Risk Management PlanSpeak AI's plans for pandemics or infectious disease outbreaks to ensure business continuity, protect employee health, and maintain service.
Environmental, Social, and Corporate Governance (ESG) PolicySpeak AI's ESG Policy outlines commitments to sustainability, social responsibility, diversity, ethics, and strong governance practices.
The Anti-Bribery and Anti-Corruption PolicyEstablishes guidelines to ensure compliance with anti-bribery laws and regulations, preventing unethical business and a culture of honesty.
Anti-Trust & Anti-Competitive Business Practices PolicyDefines policies to prevent anti-competitive behavior, including price-fixing, monopolistic practices, and unfair competition strategies.
Internal Compliance & Ethics ProgramProvides guidance on internal compliance expectations, ethical behavior, and mechanisms for reporting violations.
Ethical Sourcing PolicyDefines responsible procurement practices, ensuring that suppliers follow ethical labor, environmental, and governance standards.
Fraud Detection & Prevention PolicyCovers internal and external fraud risks, prevention measures, detection methods, and incident response procedures.
Records Retention PolicyEstablishes retention schedules for electronic and paper records, including compliance with legal, regulatory, and contractual requirements.
Modern Slavery & Human Trafficking Prevention PolicyOutlines measures to prevent forced labor and human trafficking within business operations and supply chains.
Health & Safety Compliance PolicyDefines workplace health and safety measures, including hazard prevention, emergency response, and regulatory compliance.
Network Device Hardening StandardsDefines security configurations for network devices including patching, password management, and access control.
Remote Network Access PolicyDetails secure remote access requirements, including VPN use, encryption, multi-factor authentication (MFA), and monitoring controls.
Encrypted Communications PolicyRequires encryption for all remote network connections, ensuring data protection in transit and preventing unauthorized access.
DMZ Security PolicySecurity requirements for a demilitarized zone (DMZ) environment, including access restrictions, segmentation, and monitoring controls.
Wireless Security PolicyEstablishes security guidelines for Wi-Fi networks, including authentication requirements, encryption standards, and access controls.
Third-Party Data Privacy PolicyDefines privacy obligations for third-party vendors, including limitations on data use, disclosure, and compliance with privacy laws.
Cloud Hosting Compliance & Audit PolicyEstablishes audit requirements for cloud hosting providers, including security assessments, obligations, and compliance validation.
Acceptable Use PolicyDefines acceptable use of information and assets, ensuring proper handling and security practices.
Internet of Things (IoT) Security PolicyCovers security standards for IoT devices connected to Speak AI's infrastructure.
Network Segmentation & Segregation PolicyDefines security practices for isolating networks and blocking unauthorized traffic.
Collaborative Computing PolicyAddresses security for tools like video conferencing, virtual whiteboards, and shared collaboration platforms.
Sanctions Compliance PolicyEnsures compliance with international sanctions and country-blocking measures.
Offsite Backup & Storage PolicyThe purpose of this policy is to define the backup and offsite storage procedures for Speak AI Inc.
