HeyMilo AI logoHeyMilo AI

HeyMilo AI Trust Center

HeyMilo AI is in compliance with security best practices, has implemented and is monitoring comprehensive controls, and maintains policies to outline its security procedures.

Compliance

Resources

SOC 2 Type II Report
SOC 2 Type I Report
Network Security Policy
Data Classification Policy
Risk and Governance Executive Committee Charter

Controls

Access control procedures
Access review of infrastructure
VPN access
Multifactor authentication
Tracking access changes
Encryption of data
Data protection policy
Data transfer policy
Data transfer agreement
Cooperation agreements/data sharing frameworks
Source code tool
Business continuity and disaster recovery testing
Web application firewall
Outsourced Development Management
Sample code changes
Intrusion detection tool
Infrastructure baseline hardening policy
Network diagram
Infrastructure firewall
Monitoring tool
Incident response and breach notification policy
Breach notification communication
Security incident list
Alerts and remediation
Internal GDPR compliance assessments
Binding corporate rules policy
Whistleblower policy
Rectification request policy
Objection handling policy
Log management tool
Vendor management program
Vendor onboarding
Vendor list
Vendor termination
Consent records
Age verification and parental/guardian consent process
New employee and contractor agreements
Existing employee and contractor agreements
Customer onboarding
Security awareness training implemented
Employee handbook
Multi-availability zones
Asset register maintaining
Risk management program
Risk and Governance Executive Committee meeting minutes
Lawful basis assessment
Legitimate interest assessment
Patch management
Antivirus and malware configurations
Board charter
Asset register list
Termination checklist

Subprocessors

Twilio
TwilioBusiness Apps & Productivity