Skip to content

Ritual AI Security & Privacy Practices

At Ritual, we want to be transparent with our customers about our products and how we use AI to enhance our users’ experience. Below is an overview of Ritual’s AI functionality and related security and privacy practices.

What is Ritual AI?

Ritual AI is a collection of AI products and features, which currently includes:

  • AI Assistant: Helps with generating written content and brainstorming, all by using information from across your Ritual workspace and the web.
  • Document Generation: Generate text across many explorations in a database simultaneously by a pre-configured prompt.
  • Custom Domain Models: Leverage advanced machine learning infrastructure to define and deploy organization-specific AI models securely, ensuring tailored AI capabilities within your workspace.

Ritual AI features appear seamlessly in workspaces but leverage technology from several AI subprocessors. The list of subprocessors is listed below.

Data Security

  • When sending data to our AI LLM Subprocessors, the data is encrypted in transit using TLS 1.2 or greater, and no Customer Data is used to train the model.
  • All our AI LLM Subprocessors retain data for only 30 days or fewer before deletion.
  • Only data the user has access to within the specific workspace where Ritual AI is used will be sent to AI LLM Subprocessors to generate the output, meaning that the generated outputs provided to the user will not incorporate any data to which the user did not already have access.
  • For organizations using custom domain models, we provide enhanced data governance. Only data accessible to users within their specific workspace is sent to AI LLM subprocessors, ensuring that outputs generated by Ritual AI reflect the organization’s internal data policies. This means that generated outputs will only include information from the user’s accessible data, maintaining strict organizational boundaries and preventing any cross-organization data leakage.

Ritual AI Infrastructure

What is a Subprocessor?

In order to provide our Services, Ritual engages the Subprocessors listed in the tables below. A Subprocessor is a third-party engaged by Ritual Mobile, Inc., and its applicable Affiliates, to process Customer Personal Data.

List of Third-Party Subprocessors

Below is the list of Subprocessors and how we use their services.

Infrastructure

We use these Subprocessors for hosting and running our Services. These are third parties that store and process your data within our Service.

SubprocessorPurpose of ProcessingLocation
AWSHosting and storage systems providerUSA
CloudflareWeb content deliveryUSA

Platform

We use these Subprocessors to help us manage and provide the Service.

SubprocessorPurpose of ProcessingLocation
AWS - BedrockBuilding and scaling generative AI-
AnthropicService provider for hosting large language models and embeddingsUSA
OpenAIService provider for hosting large language models and embeddings and for abuse preventionUSA
PineconeVector database for storing embeddingsUSA
SentryApplication loggingUSA
SendGridEmail DeliveryUSA

Customer and Support Services

We use these Subprocessors to offer direct support services to you and your team. They are primarily used for communications between Customers and our support teams.

SubprocessorPurpose of ProcessingLocation
IntercomSupport servicesUSA
ZendeskSupport servicesUSA

Business Operations

We use these Subprocessors to manage our business and continue providing you services. From internal documentation to analytics these services are used behind the curtain to help us plan and run the business smoothly.

SubprocessorPurpose of ProcessingLocation
GoogleEvent logging for analyticsUSA
PosthogEvent logging for analyticsUSA

Last updated: July 4, 2024