Trust & security

Your data is securewith us

Total security. Zero compromises. We treat your data like our own, backed by rigorous industry standards and a team that puts your privacy first. You can sleep easy knowing that we've got your back.

EncryptionAccess ControlsRetention PolicyCloud DeploymentOn-Prem Option

How we protect your information

We document how data is used and where model training stops

Third i publishes privacy commitments that describe collection, processing, disclosure, and user rights. Public policy language also states that Google Workspace API data is not used to develop, improve, or train generalized AI or ML models.

Access controls and infrastructure safeguards are explicitly described

Public materials reference encryption, firewalls, secure server facilities, and access controls. For enterprise use cases, TiVA materials also describe cloud and on-prem deployment options with clearer data-boundary expectations.

Retention windows and deletion expectations are visible up front

Third i's privacy policy describes retention as limited to business and legal need. TiVA materials add a concrete deletion window of up to 60 days after contract termination or consent withdrawal unless the law requires longer retention.

Frequently asked questions

Does Third i publish formal security commitments today?

Yes. Third i publicly documents privacy, security, retention, and user-rights commitments in its privacy policy, with additional product-specific detail in TiVA's public FAQ.

Does Third i claim audited certifications such as SOC 2 on this page?

No. This page is limited to publicly substantiated statements from Third i materials and does not present unsupported certification badges or audit claims.

How long does Third i retain customer data?

Third i's privacy policy says data is kept only as long as necessary for business or legal needs. TiVA materials add that customer data is deleted within 60 days after contract termination or consent withdrawal unless retention is legally required.

Can enterprises keep sensitive data in their own environment?

For TiVA, yes. Third i publicly states that the product can be deployed on-premises, and that in cloud deployments only call analytics and metadata are transmitted while sensitive customer data remains with the client.

Still have questions?

Reach out to the Third i team or go directly to the underlying legal and policy pages for the exact governing language.

Privacy policy

Publicly documented

Third i publishes its privacy commitments, processing categories, and user rights.

Deletion window

Up to 60 days

TiVA customer data is deleted within 60 days after contract termination or consent withdrawal.

Deployment model

Cloud or on-prem

TiVA can run in the cloud or on-premises depending on enterprise requirements.

Security controls

Encryption + access controls

Third i discloses encryption, firewalls, secure servers, and access controls in public materials.