Skip to content

Security & Data Protection

Last updated: April 2026

1. Our Security Commitment

At AS Automation Systems, security is not an afterthought — it is built into every layer of our infrastructure. We employ industry-standard practices to protect your data, conversations, and business information from unauthorised access, disclosure, or loss.

2. Data Encryption

We protect data in transit and at rest:

  • In Transit: All data transmitted between your browser and our servers is encrypted using TLS 1.3. API communications with third-party services (WhatsApp, HubSpot, Airtable) use authenticated HTTPS connections.
  • At Rest: Sensitive configuration data and conversation logs are stored with encryption at rest on our secure servers.

3. Access Control

We follow the principle of least privilege:

  • Internal access to customer data is restricted to authorised personnel only
  • All administrative actions are logged and auditable
  • API keys and credentials are rotated regularly and never stored in plain text
  • Two-factor authentication is enforced on all internal systems

4. Infrastructure Security

Our infrastructure is hosted on hardened server environments with:

  • Regular security patches and OS updates
  • Network-level firewalls and DDoS protection
  • Automated vulnerability scanning
  • Intrusion detection and real-time alerting

5. AI & Chat Data Handling

Conversations processed through our AI chat assistant are:

  • Transmitted via secure webhook endpoints
  • Not used to train third-party AI models
  • Retained only as long as necessary for service delivery
  • Accessible to you upon request

6. Incident Response

In the unlikely event of a security breach, we will:

  • Contain and mitigate the incident within 24 hours
  • Notify affected customers within 72 hours
  • Conduct a thorough post-incident review
  • Implement additional safeguards to prevent recurrence

7. Your Responsibilities

To maintain security, we recommend that you:

  • Use strong, unique passwords for your accounts
  • Keep your API credentials and access tokens confidential
  • Report any suspected security issues to us immediately
  • Ensure your own devices and networks are secure

8. Reporting Security Issues

If you discover a security vulnerability, please report it responsibly to contact@asautomation.systems. We take all reports seriously and will respond within 48 hours.

9. Contact

For security-related questions, contact us at contact@asautomation.systems.