1.1. Provider Liability for Data BreachesDuckie's contract and terms of service outline the liability in the event of a data breach or compromise of the customer's environment. Specific details regarding Duckie's liability can be found in the official terms of service document, which is accessible at https://www.duckie.ai/terms. It is recommended that customers review this document thoroughly to understand the full extent of Duckie's liability and the protections offered in case of a security incident.For the most up-to-date and accurate information on liability clauses, customers should refer directly to the terms of service at the provided URL.
1.2. Service Level Agreement (SLA) and Performance GuaranteesDuckie has an active Service Level Agreement (SLA) in place that outlines minimum performance standards and guarantees. Our SLA specifically addresses system availability and incident response times, ensuring a high level of service quality for clients.
1.3. Right of Termination for Material Breach of Privacy and Security ObligationsIn the event that a party materially breaches their privacy and security obligations as outlined in the terms of service, the other party retains the right to terminate the agreement.
2.1. Provider's Rights to Customer Data and Account InformationDuckie does not reserve any rights to use, disclose, or make public customers' account information or data.Our policy prohibits any unauthorized use, disclosure, or publication of customer data or account information. This applies to all forms of customer data, including but not limited to personal information, transaction records, and any other data stored within Duckie's systems.
2.2. Preservation of Customer Data Intellectual Property RightsIn accordance with our data ownership policies and practices, the intellectual property rights of our customers' data remain fully intact. Customers retain all rights, title, and interest in their data, including any intellectual property rights associated with that data.
2.3. Provider's Rights to Customer Data After RemovalIn accordance with our data ownership policies, Duckie does not retain any rights to customer data after it has been removed from our system.
3.1. Industry Standard Security CertificationsWe are actively working in the process of obtaining SOC-2 compliance. We have partnered with Thoropass, a reputable compliance automation platform, to support us.We will keep our clients and partners informed of our progress throughout the SOC-2 compliance process and will provide updates on any additional certifications we may pursue in the future to further strengthen our security and privacy practices.
3.2. Provision of Independent Audit Reports to CustomersIn accordance with our commitment to transparency and regulatory compliance, we confirm that customers will receive a copy of any independent audit reports upon their finalization.
4.1. Third-Party Service Providers and RelationshipsDuckie relies on several third-party service providers, which have been carefully selected and assessed to ensure they meet our security and compliance standards. The following outlines our key third-party relationships:
We have implemented the following measures:
4.2. Monitoring of Upstream Providers and Third-Party VendorsWe recognize the critical importance of maintaining service continuity, compliance, and security across our entire supply chain. To address potential risks associated with upstream providers and third-party vendors, we have implemented a robust monitoring system in collaboration with Thoropass.
5.1. Disaster Recovery Plan ImplementationWe has implemented a comprehensive disaster recovery plan to ensure business continuity and data protection in the event of unforeseen circumstances.
5.2. Failover Site Certification and StandardsDuckie maintains robust disaster recovery measures, which include the implementation of failover sites.
Key points regarding our failover sites:
6.1. Provider and Third-Party Access to Customer DataAccess to customer data and environments is strictly limited. Currently, two individuals within the Duckie organization have direct access to customer data:
In addition to internal access, we utilize services from two third-party vendors:
6.2. Internal Access Control PracticesAccess to customer data is granted exclusively to internal engineering leads, who have been vetted and deemed necessary for operational purposes.To enforce these access control policies, we use comprehensive permission controls. These controls are designed to:
6.3. Deprovisioning of Access to Customer DataWe maintains a strict policy regarding the deprovisioning of access to customer data, environments, and applications that store customer data. We ensure that access is revoked within 24 hours after a user leaves or is terminated from our provider services.Duckie’s access management system is configured to automatically trigger the deprovisioning process upon notification of an employee's departure or termination.Regular reviews are conducted to verify the effectiveness of this deprovisioning process.
6.4. Public Internet Accessibility of Customer DataCustomer data and/or environment will not be accessible from the public internet. Duckie’s infrastructure and access controls are designed to prevent any direct connection between customer data and the public internet.
6.5. Multi-Factor Authentication for Remote AccessIn accordance with our security protocols, multi-factor authentication (MFA) is required for all Duckie employees accessing the customer's environment or data.
6.6. LLM Data Access and RetentionDuckie utilizes a combination of open-source and closed-source language models (LLMs) to provide its services. Our approach to LLM data access and retention is designed to maximize data security and privacy:
6.6.1. Open-source ModelsOpen-source models used by Duckie do not share data with third-party vendors, ensuring complete data isolation.
6.6.2. Closed-source ModelsBy default, for closed-source models, we use OpenAI and Anthropic:
6.6.3. AWS Bedrock OptionCustomers can elect to use only models available in AWS Bedrock:
6.6.4. Self-hosted OptionDuckie offers a fully self-hosted version for customers with heightened security requirements:
6.6.5. Data Privacy AssuranceRegardless of the chosen deployment option (default, AWS Bedrock, or self-hosted), Duckie is committed to ensuring that customer data is not retained or used for training purposes without explicit consent. Our systems and partnerships are designed to maintain the highest standards of data privacy and security.
7.1. Dedicated Data Storage for Customer EnvironmentsDuckie’s system architecture employs silo'd data collections.
7.2. Data Transmission Protection and EncryptionTo ensure the security of transmitted data, we implement Transport Layer Security (TLS) protocols.
7.3. Data Protection through Encryption at RestWe implement data protection measures to ensure the security of stored information. The primary method employed is encryption at rest.
7.4. Vulnerability Assessments and Penetration TestingWe have implemented a schedule of vulnerability assessments and penetration testing:
7.5. Secure Application Development Standards and ProtocolsDuckie adheres to the Open Web Application Security Project (OWASP) guidelines for secure application development.As part of our commitment to these standards, we have implemented automated security testing procedures. These automated tests are integrated into our development pipeline.
7.6. Application Security Measures in Production EnvironmentOur production environment employs a set of application security measures and controls to ensure the integrity, confidentiality, and availability of our systems and data. These measures include:
7.7. Administrative Web Interface AccessAs part of our services, customers will be granted access to an administrative web interface to manage their data.
8.1. Security Incident and Breach Response PlanDuckie maintains security incident and breach response plans to address potential security threats and data breaches effectively.For further information or to request access to the detailed plan, please contact our security compliance team at founders@duckie.ai.
8.2. Customer Notification Process for Security IncidentsDuckie will notify customers in the event their environment or data is involved in a security incident. Security incident notifications are sent to customers via email.
Our security incident notifications include the following key information:
8.3. Customer Incident Reporting MechanismCustomers can report any security-related issues by sending an email to founders@duckie.ai.This email address serves as the primary point of contact for all security incident reports and concerns from our customers.
8.4. Security and Audit Log RetentionSecurity logs are retained for a period of 6 months. These logs capture various security-related events and activities within our systems.Audit logs are maintained indefinitely.
9.1. Self-Hosted Solution AvailabilityWe offers a comprehensive self-hosted version of Duckie to meet the security and compliance needs of our clients.Key features of our self-hosted solution include:
In order to resolve a complaint regarding the Services or to receive further information regarding use of the Services, please contact us at:
Duckie AI, Inc
476 Broadway
New York, NY 10013
United States
Phone: (609) 937-8853
Email: founders@duckie.ai