Security Overview
How Octocom deals with security
Last updated
How Octocom deals with security
Last updated
Octocom is built with best-in-class security practices to keep your business data safe and secure at every layer. This includes state-of-the-art encryption, safe and reliable infrastructure partners, and independently verified security controls.
Besides traditional software security practices, we have also innovated novel ways of ensuring safety and reliability when using large language models (LLMs). We have found effective approaches at eliminating the risk of LLM hallucinations and jailbreaking.
You can find more information about how we handle security by browsing this wiki. Additionally, you can find some of our FAQs below.
How do I report a security vulnerability, bug, concern or adverse impact?
Please contact us at [email protected] or through your dedicated account manager.
Where is your data hosted?
Octocom services and data are hosted in Microsoft Azure facilities in the European Union.
Does Octocom own our customer data?
Customers retain all right, title and interest for the data provided to Octocom.
Is your data encrypted?
All communication outside our cloud environment is encrypted. In addition, our databases are encrypted at rest.
How can I access, transfer or delete my data?
Contact us at [email protected] and we can help.