This Privacy Policy describes how Unify AI Tech LLC (“Unify,” "we," "us," or "our") collects, uses, discloses, and protects your personal information when
you use our website, software applications, and Unify’s other services (all together, the “Services").
By using the Services, you agree to the terms of this Privacy Policy. If you do not agree
with this policy, please do not use our Services.
- Information We Collect
- 1.1. User Data. We may collect and store the following personal information from users
of our Service:
- 1.1.1. Contact information such as your name, email address, and phone number.
- 1.1.2. Account information such as information related to your account, including
username, password, and other authentication details.
- 1.2. Usage Data. We may also collect non-personal information about your usage of the
Services, which may include:
- 1.2.1. API Requests: Information related to the TTS API requests you make, including
text input, output audio, request times, and IP addresses.
- 1.2.2. Device and Browser Information: Information about the device and browser you
use to access the Services, including browser type, version, and operating system.
- How We Use Your Information
- 2.1. We use the collected information for the following purposes:
- 2.1.1. To provide the Services.
- 2.1.2. To enhance the quality of our Services and customize the Services based on user
preferences.
- 2.1.3. To communicate with you to send important notices, updates, and promotional
materials.
- 2.1.4. To protect our Services and its users from fraud, abuse, and unauthorized
access.
- 2.1.5. To comply with legal and regulatory requirements.
- Data Sharing
- 3.1. We do not sell your personal information. However, we may share your information
with third parties under the following circumstances:
- 3.1.1. We may engage third-party service providers to assist in delivering our
Services, and they may have access to your personal information for this purpose.
- 3.1.2. We may share your information in response to a legal request, such as a court
order or subpoena.
- Data Security
- 4.1. We take reasonable measures to protect your personal information from unauthorized
access, disclosure, alteration, and destruction. However, no data transmission over the
internet is completely secure, and we cannot guarantee the security of your information.
- 4.2. All data is designated for long-term storage on Google Cloud Storage (“GCS”). Each customer is allocated a unique bucket for their exclusive use.
- 4.3. By default, every piece of data housed within a GCS bucket benefits from encryption
at the provider level. This implements fundamental physical security. All data on GCS is
distributed across a myriad of computers located in diverse geographical areas. This
data is then segmented and duplicated across several systems to eliminate any singular
point of vulnerability. The naming convention Google adopts for these data segments is
intentionally randomized, adding an extra layer of security and rendering them
indecipherable at a glance.
- 4.4. All data is further encrypted at the application layer to guarantee data safety and
to implement our data retention policy. All communications transferring the data are
encrypted with HTTPS.
- Access and Security Policies
- 5.1. As of now, only our Data Engineering team, along with certain high-ranking IT
personnel, possess the necessary clearance to access your data in GCS via GCS’s IAM to
GCS buckets and the encrypted content therein.
- 5.2. We adhere to the Principle of Least Privilege, ensuring that Unify team members are
granted only the minimum levels of access necessary to fulfill their roles. All data is
stored in the US and only US based employees have access to such data.
- 5.3. For Data in transit - All network data transmissions and communications are secured
using TLS 1.2 or later.
- 5.4. For data at rest - Google defaults to the AES 256 encryption algorithm:
https://cloud.google.com/docs/security/encryption/default-encryption
- Data Retention Policy
- 6.1. All confidential customer data is retained for a period of 30 days, after which it
is deleted from all GCS buckets. This facilitates retrospective analyses and refinements
of our algorithms that are dependent on this data.
- 6.2. To implement this retention policy, data is further encrypted using a key stored
only in Google Cloud Key Management. Each day, this key is rotated and the key which is
now 30 days old is destroyed. This means that no matter what the underlying storage
architecture, the data becomes unreadable and unrecoverable when the retention period
expires.
- Your Choices
- 7.1. You have the right to:
- 7.1.1. Access, correct, or delete your personal information.
- 7.1.2. Opt-out of marketing communications.
- 7.1.3. Disable or delete your account.
- Changes to this Privacy Policy
- 8.1. We may update this Privacy Policy from time to time to reflect changes in our
practices and the law. The "Last updated" date at the top of this page will indicate
when the latest changes were made.
- Contact Us
- 9.1. If you have any questions or concerns about this Privacy Policy, please contact us
at [email].