Skip to content

Data Protection

Our Data Minimization Philosophy

At Sociable AI, we follow a strict data minimization approach. We only collect and store the absolute minimum data needed to provide our services:

  • No Content Storage: We do not persistently store the content of social media posts or interactions beyond what’s needed for core functionality
  • Access Token Focus: We store access tokens rather than credentials, ensuring we never have access to your passwords
  • Transient Processing: Social media content is processed transiently and not permanently stored

Data Categories and Protection

Data TypeStorage ApproachProtection Measures
Authentication dataHandled by ClerkIndustry-standard encryption via Clerk’s SOC 2 compliant service
OAuth tokensEncrypted at restAccess controlled, rotated per platform requirements
User settingsMinimal storageEncrypted at rest
Message dataLimited retentionEncrypted at rest, user-deletable

Privacy Principles

Our data protection practices are designed with privacy in mind:

  • Access Controls: Users can request access to their personal data
  • Deletion Rights: We provide account deletion functionality
  • Data Portability: We support export options for user data when requested
  • Purpose Limitation: Data used only for specified, legitimate purposes
  • Transparency: Clear communication about our data practices

Third-Party Data Processing

When we engage third-party services to process data:

  1. We select providers with strong security credentials (those with SOC 2, GDPR compliance)
  2. We implement appropriate data processing agreements
  3. We limit data sharing to only what’s necessary for service provision

Technical Protection Measures

Encryption

  • TLS 1.2+ for all data in transit
  • AES-256 encryption for data at rest
  • Secure key management practices

Access Controls

  • Role-based access controls
  • Least privilege principle
  • Regular access reviews

Monitoring

  • Continuous monitoring for unusual access patterns
  • Automated alerts for potential security events via Google Cloud Security Command Center, AWS CloudWatch, Sentry, Clerk Security Alerts, Supabase Security Monitoring, and infrastructure monitoring systems
  • Regular security reviews of data access logs

Retention and Deletion

  • Regular data review and cleanup processes
  • Automatic deletion of transient processing data
  • User-controlled data deletion options
  • Clear retention periods defined for each data category

Contact for Data Concerns

If you have questions about how we handle your data or wish to exercise your data rights, please contact us at: