🔒 Data Privacy & Security Terms
Effective: May 01, 2025
Last updated: May 01, 2025
Reasonyx is committed to protecting your data with strict security measures and transparent privacy practices.
This document outlines how your data is collected, stored, accessed, and secured while using Reasonyx.
For full legal terms, visit: https://reasonyx.com/terms_conditions/
🔐 Data Ownership and Access
- You own all data you upload, generate, or interact with in Reasonyx.
- Reasonyx does not sell, rent, or share your data with third parties.
- Data within your workspace is completely private to you and your team.
- Reasonyx staff cannot access your data unless you explicitly invite support or share access.
🧱 Data Isolation and Workspace Security
- Each workspace is logically isolated from others — your data cannot be viewed by other users or organizations.
- We enforce strict role-based access controls (RBAC) to limit data exposure.
- All user credentials, tokens, and API keys are encrypted at rest.
🔄 Third-Party Integrations and API Usage
- You may connect external tools (e.g. OpenAI, Salesforce) using your own API keys.
- When using Reasonyx-managed integrations, only the necessary data fields are transmitted — and only when you run an action.
- All API keys are stored in an encrypted format and are never shown once saved.
- You may remove or rotate API keys at any time.
🗄️ Data Storage and Retention
All data you input or generate in Reasonyx is stored securely on our AWS infrastructure located in the United States.
- Data is retained for 60 days from the date of creation or upload.
- After 60 days, data is automatically deleted unless linked to an active workspace.
- Deleted workspaces trigger immediate removal of all associated data across backups and logs.
We do not mirror your data across external regions, and we do not use your data for training, resale, or analytics outside your account’s context.
All storage uses AES-256 encryption at rest and TLS encryption in transit, with full infrastructure monitoring and access controls in place.
📈 Platform Logs and Monitoring
- We log action runs and system-level events to ensure security and performance — never the content of your data.
- These logs are isolated per workspace and accessible only for diagnostic purposes if explicitly shared.
🚨 Breach Notification and Incident Response
If a data breach or unauthorized access occurs, Reasonyx will:
- Notify affected users as soon as possible
- Share the scope, nature, and potential impact of the incident
- Support you in any required reporting to authorities or clients
All incidents are handled according to our internal security response plan.
☁️ Infrastructure and Encryption
- All data is encrypted in transit (TLS 1.2+) and at rest (AES-256).
- We use secure cloud infrastructure with active monitoring, isolation, and automated scaling.
- Backups are encrypted and stored separately with strict access controls.
🧾 Compliance and Limitations
- Do not upload regulated personal health information (PHI), cardholder data, or national ID data unless you have a separate agreement with Reasonyx.
- Reasonyx follows modern security best practices inspired by industry standards (SOC 2, ISO 27001).
📬 Contact and Requests
To report a concern or request data access/removal, contact:
We respond to privacy-related requests within 7 business days.
Your privacy is not a feature — it’s the foundation.
To view our full Terms & Conditions, visit:
https://reasonyx.com/terms_conditions/