Ritual AI Security & Privacy Practices
At Ritual, we want to be transparent with our customers about our products and how we use AI to enhance our users’ experience. Below is an overview of Ritual’s AI functionality and related security and privacy practices.
What is Ritual AI?
Ritual AI is a collection of AI products and features, which currently includes:
- AI Assistant: Helps with generating written content and brainstorming, all by using information from across your Ritual workspace and the web.
- Document Generation: Generate text across many explorations in a database simultaneously by a pre-configured prompt.
- Custom Domain Models: Leverage advanced machine learning infrastructure to define and deploy organization-specific AI models securely, ensuring tailored AI capabilities within your workspace.
Ritual AI features appear seamlessly in workspaces but leverage technology from several AI subprocessors. The list of subprocessors is listed below.
Data Security
- When sending data to our AI LLM Subprocessors, the data is encrypted in transit using TLS 1.2 or greater, and no Customer Data is used to train the model.
- All our AI LLM Subprocessors retain data for only 30 days or fewer before deletion.
- Only data the user has access to within the specific workspace where Ritual AI is used will be sent to AI LLM Subprocessors to generate the output, meaning that the generated outputs provided to the user will not incorporate any data to which the user did not already have access.
- For organizations using custom domain models, we provide enhanced data governance. Only data accessible to users within their specific workspace is sent to AI LLM subprocessors, ensuring that outputs generated by Ritual AI reflect the organization’s internal data policies. This means that generated outputs will only include information from the user’s accessible data, maintaining strict organizational boundaries and preventing any cross-organization data leakage.
Ritual AI Infrastructure
What is a Subprocessor?
In order to provide our Services, Ritual engages the Subprocessors listed in the tables below. A Subprocessor is a third-party engaged by Ritual Mobile, Inc., and its applicable Affiliates, to process Customer Personal Data.
List of Third-Party Subprocessors
Below is the list of Subprocessors and how we use their services.
Infrastructure
We use these Subprocessors for hosting and running our Services. These are third parties that store and process your data within our Service.
Subprocessor | Purpose of Processing | Location |
---|---|---|
AWS | Hosting and storage systems provider | USA |
Cloudflare | Web content delivery | USA |
Platform
We use these Subprocessors to help us manage and provide the Service.
Subprocessor | Purpose of Processing | Location |
---|---|---|
AWS - Bedrock | Building and scaling generative AI | - |
Anthropic | Service provider for hosting large language models and embeddings | USA |
OpenAI | Service provider for hosting large language models and embeddings and for abuse prevention | USA |
Pinecone | Vector database for storing embeddings | USA |
Sentry | Application logging | USA |
SendGrid | Email Delivery | USA |
Customer and Support Services
We use these Subprocessors to offer direct support services to you and your team. They are primarily used for communications between Customers and our support teams.
Subprocessor | Purpose of Processing | Location |
---|---|---|
Intercom | Support services | USA |
Zendesk | Support services | USA |
Business Operations
We use these Subprocessors to manage our business and continue providing you services. From internal documentation to analytics these services are used behind the curtain to help us plan and run the business smoothly.
Subprocessor | Purpose of Processing | Location |
---|---|---|
Event logging for analytics | USA | |
Posthog | Event logging for analytics | USA |
Last updated: July 4, 2024