Security and Data Use

This page outlines our security posture and how we manage data security.

Security Overview

SalesMuse is hosted in the cloud, with information being brokered between your web browser, our serverless infrastructure, and third party services.

Web Browser Security

Your audio data is buffered locally, then pushed to our serverless infrastructure and third party services, where it is processed and the outputs from the transcription and AI services are received back by the browser. All of this is done over SSL with our private keys for the servers managed via a secret management tool in our backend.

Serverless Infrastructure Security

Our serverless infrastructure is hosted in Vercel and Retool. We use private keys which are stored securely to process and store your data.

Third Party Services Security

Your data is passed between the following data processors. You can see information about their security practices at the links below:

Data Use Agreement

This Data Use Agreement (the "Agreement") sets forth the terms and conditions governing the use of data provided by [Organization Name] ("Data Provider") to [Recipient Name] ("Recipient"). By accessing or using the data provided by the Data Provider, Recipient agrees to be bound by the terms and conditions of this Agreement.

1. Purpose

The purpose of this Agreement is to define the permitted use of the data provided by the Data Provider. The data may only be used for the purpose specified in this Agreement and may not be used for any other purpose without the prior written consent of the Data Provider.

  1. Permitted Use of Data

[Your Company] shall have the right to access and use the data exclusively for the purpose of training the machine learning model.

3. Data Usage Restrictions

Recipient agrees to the following restrictions when using the data provided by the Data Provider:

  • Recipient shall not disclose the data to any third party without the prior written consent of the Data Provider.
  • Recipient shall not use the data for any illegal or harmful activities.
  • Recipient shall take appropriate measures to ensure the security and confidentiality of the data.

4. Ownership and Intellectual Property

The data provided by the Data Provider remains the property of the Data Provider. Recipient acknowledges that no intellectual property rights are transferred under this Agreement.

5. Term and Termination

This Agreement shall remain in effect until terminated by either party. Either party may terminate this Agreement with written notice to the other party.

  1. Security Measures: [Your Company] shall implement appropriate security measures to protect the data from unauthorized access or disclosure.
  2. Data Handling: Upon completion of the training, [Your Company] shall return or destroy the data in a manner that ensures it cannot be recovered.
  3. Confidentiality: [Your Company] shall keep the data confidential and shall not disclose it to any third party without the prior written consent of [Data Owner].

6. Governing Law

This Agreement shall be governed by and construed in accordance with the laws of [Jurisdiction]. Any disputes arising out of or in connection with this Agreement shall be subject to the exclusive jurisdiction of the courts of [Jurisdiction].

By signing below, the parties acknowledge that they have read, understood, and agreed to the terms and conditions of this Data Use Agreement.