Data & Security
How your data is handled, stored, and protected.
This page is written for CTOs, IT leads, and legal or procurement teams evaluating Unify. If your security team has requirements not covered here, contact us before your discovery call — we are happy to complete vendor questionnaires or provide additional documentation.
Data isolation
Your data is never shared across clients. Each Unify deployment operates in a fully isolated environment. The data you provide to train your agents — support tickets, customer records, usage data, prospect lists — is used exclusively within your deployment and is not accessible to other clients or used to improve models outside your environment.
What data we process
| Data type | Agent | Purpose | Retention |
|---|---|---|---|
| Support tickets | RESOLVE | Train the knowledge model | Duration of contract + 30 days |
| Product usage events | WELCOME, GROW, STAY | Power agent logic | Duration of contract + 30 days |
| Prospect lists | ATTRACT | Generate outreach sequences | Duration of contract + 30 days |
| Customer health data | STAY | Build churn prediction model | Duration of contract + 30 days |
| Knowledge base content | RESOLVE, WELCOME | Answer queries | Duration of contract + 30 days |
What we do not store
- Passwords or authentication credentials
- Payment or financial account data
- Data beyond the scope agreed in your NDA and data processing agreement
- Personal data beyond what is necessary for the agent function
GDPR
Unify operates in full compliance with GDPR. We act as a data processor on your behalf. Before any data is shared, we execute a Data Processing Agreement (DPA) that covers lawful basis, data subject rights, sub-processor obligations, and breach notification procedures. Data is processed within the EU or EEA unless your contract specifies otherwise.
The sandboxed POC
During the 48-hour proof of concept, your data is processed in a sandboxed environment that is entirely separate from any production system. The POC environment is destroyed after the review unless you choose to proceed to deployment. This is designed specifically to satisfy IT review requirements before any production commitment.
NDA and DPA
We sign an NDA before you share any data. A standard Data Processing Agreement is included with all contracts. Both documents are available for legal review prior to the discovery call.
Questions?
If your security or legal team has specific requirements not addressed here, contact us before your discovery call. We are happy to complete vendor security questionnaires or provide additional documentation.