Security Documentation

Comprehensive security information for enterprise evaluation and vendor risk assessment

Available Documentation

Access our security certifications and compliance documentation

SOC2 Type II Report

Our independent auditor's report on our security, availability, and confidentiality controls. Request access through our Trust Portal.

Request Access

Data Processing Agreement

Our standard DPA covering GDPR requirements and data processing terms. Request access through our Trust Portal.

Request Access

Trust Portal

Real-time view of our security posture, certifications, and compliance status via our partner Dsalta.

Open Portal

Security Overview

Our Security Commitment

At Time Machine AI, security is fundamental to everything we build. We understand that our enterprise customers trust us with sensitive training data, sales strategies, and employee performance information. This trust is not taken lightly.

Certifications & Compliance

Certification Status Description
SOC2 Type II Certified Security, availability, and confidentiality controls audited annually
GDPR Compliant Full compliance with EU data protection regulations
CCPA Compliant California Consumer Privacy Act compliance
Data Encryption Active AES-256 for database files, TLS 1.3 in transit

Data Protection

All customer data is protected using industry-leading security practices:

  • Database Encryption: All database files are encrypted using AES-256 encryption.
  • Encryption in Transit: All communications are secured using TLS 1.3, the latest transport layer security protocol.
  • Data Isolation: Customer data is logically isolated using tenant-specific encryption keys and access controls.
  • Backup & Recovery: Automated daily backups with geo-redundant storage and tested recovery procedures.

Access Control

We implement strict access controls to protect your data:

  • Enterprise-Grade Authentication: Secure authentication with strong password policies and account protection.
  • Multi-Factor Authentication: MFA required for all user accounts and enforced for administrative access.
  • Role-Based Access Control: Granular permissions ensure users only access data they need.
  • Session Management: Automatic session timeout and secure session handling.

Infrastructure Security

Our platform is built on enterprise-grade cloud infrastructure:

  • Cloud Hosting: Hosted on Microsoft Azure with SOC2 certified data centers.
  • Network Security: Web Application Firewall (WAF) and DDoS protection.
  • Monitoring: 24/7 security monitoring with automated threat detection.
  • Incident Response: Documented incident response procedures with defined SLAs.

AI & Data Practices

Time Machine AI leverages advanced AI technologies while maintaining strict data privacy:

  • AI Technologies: We use Large Language Models (LLMs), video generation models, and voice models to power our interactive training platform.
  • No Model Training on Customer Data: We never train our AI models on customer data. Your proprietary information remains yours.
  • Tenant-Isolated Improvements: Data is used only to enhance experiences within each tenant. Customers benefit from improvements based solely on their own data.
  • Data Privacy: Your training content, role-play sessions, and performance data are never shared across tenants or used to improve services for other customers.

Vendor Security Questionnaires

We regularly complete security questionnaires for enterprise customers including:

  • SIG (Standardized Information Gathering)
  • CAIQ (Consensus Assessments Initiative Questionnaire)
  • Custom vendor assessment questionnaires

To request a completed questionnaire or submit your own:

Contact Security Team

Need More Information?

Our security team is ready to answer your questions and provide additional documentation.