Trust & security

Your data is securewith us

Total security. Zero compromises. We treat your data like our own, backed by rigorous industry standards and a team that puts your privacy first. You can sleep easy knowing that we've got your back.

EncryptionAccess ControlsRetention PolicyCloud DeploymentOn-Prem Option

How we protect your information

We DO NOT use your data to train AI

Third i publishes privacy commitments that describe collection, processing, disclosure, and user rights. Public policy language also states that Google Workspace API data is not used to develop, improve, or train generalized AI or ML models.

Fine controls for roles based access

Every workspace has granular access controls to restrict who can view or manage specific data and features. We also use industry standard protections to protect customer information against unauthorized access, misuse, or loss.

Clear data retention windows and deletion processes

Our Privacy Policy and Terms documents outline retention principles and user rights. Customer data is deleted within 60 days after contract termination or consent withdrawal.

Frequently asked questions

Does Third i publish formal security commitments today?

Yes. Third i publicly documents privacy, security, retention, and user-rights commitments in its privacy policy.

Does Third i claim audited certifications such as SOC 2 on this page?

No. This page is limited to publicly substantiated statements from Third i materials and does not present unsupported certification badges or audit claims.

How long does Third i retain customer data?

Third i's privacy policy says data is kept only as long as necessary for business or legal needs. Customer data is deleted within 60 days after contract termination or consent withdrawal unless retention is legally required.

Still have questions?

Reach out to the Third i team or go directly to the underlying legal and policy pages for the exact governing language.

Privacy policy

Publicly documented

Third i publishes its privacy commitments, processing categories, and user rights.

Deletion window

Up to 60 days

TiVA customer data is deleted within 60 days after contract termination or consent withdrawal.

Deployment model

Cloud or on-prem

TiVA can run in the cloud or on-premises depending on enterprise requirements.

Security controls

Encryption + access controls

Third i discloses encryption, firewalls, secure servers, and access controls in public materials.