Security breaches will be communicated within 48 hours, and vulnerabilities are fixed ASAP.
Users can be assigned different roles to administer, manage, engage with, or access content.
Users can request account and user data deletion via the following e-mail address: email@example.com.
Access to customer data is limited to authorized employees who require it for their job and data access is logged.
We keep data secure in transit and at rest. Data is on accessible via TLS/SSL and is encrypted with AES256 at rest.
Single Sign-on (SSO) allows you to authenticate users in your own systems without requiring them to enter additional login credentials.
Flexible Annotations Select an area, drop a sticky note, or leave pencil markups for clearer, faster feedback. Timestamp commenting
Our team runs penetration testing with the NCC Group. These annual network and application layer penetration tests follow Google's Penetration Testing Guidelines.
Air is SOC 2 compliant. Air works with Drata, the world’s most advanced security and compliance automation platform, to meet SOC 2 standards and has successfully passed an independent audit. The security of our customers’ data remains Air’s top priority, and our SOC 2 Type I report objectively certifies our ability to ensure its protection.
We have uptime of 99.9% or higher. You can check our past month stats at https://status.air.inc/.
To report any security vulnerabilities or receive additional details on our security provisions, please email us at firstname.lastname@example.org. 🔐 If interested in advanced security settings in your Air workspace contact sales to learn more about our Enterprise plan →