Security breaches will be communicated within 48 hours, and vulnerabilities are fixed ASAP.
Users can be assigned different roles to administer, manage, engage with, or access content.
Users can request account and user data deletion via the following e-mail address: email@example.com.
Access to customer data is limited to authorized employees who require it for their job and data access is logged.
We keep data secure in transit and at rest. Data is on accessible via TLS/SSL and is encrypted with AES256 at rest.
Single Sign-on (SSO) allows you to authenticate users in your own systems without requiring them to enter additional login credentials.
Flexible Annotations Select an area, drop a sticky note, or leave pencil markups for clearer, faster feedback. Timestamp commenting
Air is SOC 2 compliant. Air works with Drata, the world’s most advanced security and compliance automation platform, to meet SOC 2 standards and has successfully passed an independent audit. The security of our customers’ data remains Air’s top priority, and our SOC 2 Type I report objectively certifies our ability to ensure its protection.
We have uptime of 99.9% or higher. You can check our past month stats at https://status.air.inc/.