Learn more about our security measures
Your data is protected with advanced technology and industry-grade practices
Rigorous security
standards
All data submitted to or generated with
Kelsen undergoes a level of professional
security controls that far surpasses
that of any consumer-facing language models.
Data privacy: our primary concern
To ensure an industry-leading level of data privacy compliance, we have partnered with Private AI to deploy their cutting- edge machine learning technology to ensure that all personally identifiable information is kept under lock and key and is never viewed any language model.
User data is encrypted at all times
Data is encrypted in transit and at rest
with AES 256-bit professional-grade
encryption protocols to ensure that user data is only viewable by the user. Not even Kelsen can access user data.
FAQs
All the information you need to navigate our services, policies, and legal compliance with confidence.
How is sensitive and personally-identifiable information handled by Kelsen?
We go to considerable lengths to keep user data safe.
Kelsen has partnered with Private AI, to deploy their cutting-edge machine learning identification technology. This model relies on the latest advancements in machine learning to identify personally-identifiable information based on context, understanding text in a way that is similar to humans. This technology identifies over 55 different types of direct and quasi-identifiers in 49 different languages.
Importantly, this identification model is hosted on Kelsen’s server infrastructure, which means that the data never gets transferred to Private AI or any third parties.
To ensure informational security, all written data submitted to or produced in Kelsen software:
(i) is verified for over 55 different types of personally-identifiable information;
(ii) any personally-identifiable information found in the input data (such as names, dates, document numbers, addresses, countries, email, IP, monetary values, etc.) is automatically extracted and substituted for context-appropriate pseudonyms;
(iii) the correspondence keys linking the pseudonyms to the original information are kept on-premise, in an encrypted repository that is only accessible to the user and these data are never transferred to a language model; and
(iv) the pseudo-anonymized data is only re-identified with the original personally identifiable information in the last leg of the text generation process, after the output text has been generated by the language model, and before the data is served back to the user.
Which AI models does Kelsen utilize?
Presently, Kelsen employs a mixture of proprietary and custom-builds of open source neural networks and large language models, hosted and operated by Kelsen.
Are user data retained by a language model?
No. We do not use client data to fine-tune or train our base model, although clients are free to safely finetune their dedicated instances of our models with their own data.
Client fine-tuning of their respective instances is strictly limited to the client’s own instance and does not communicate with is visible to, or can otherwise benefit Kelsen’s base models or the model instances of any other client or third party.
Moreover, user’s prompts (inputs) and completions (outputs), embeddings and training data:
(i) are NOT available to other customers;
(ii) are NOT available to Kelsen or any third parties;
(iii) are NOT used to improve language models deployed by Kelsen or any third parties;
(iv) are NOT used to improve products or services provided by Kelsen or third parties;
How is data encrypted?
All data is encrypted in transit and at rest in our system.
Kelsen encrypts all data in transit via SSL/TLS (Transport Layer Security) with the 256-bit AES (Advanced Encryption Standard) protocol, meeting industry standards for externally-facing systems.
AES 256-bit encryption with a rotational KMS (Key Management Service) is used to protect data at rest.
Encryption keys, including the right to revoke said keys, may be assigned to the company-designated administrators.
keys will be stored in an encrypted backup vault.
Where is user data stored?
Kelsen Draft is a cloud-based application.
User data is hosted and stored in Kelsen’s cloud infrastructure, in servers located in or near to the user’s physical location, in compliance with national data residency regulations, such as GDPR, PIPEDA, LGPD, etc.
Can Kelsen be deployed on a specific cloud infrastructure?
For high-volume clients, cloud infrastructure and hosting may be changed to a specific cloud service or the client’s own cloud infrastructure, on a case-by-case basis, to accommodate specific requirements and data management policies.