Janet AI Trust Center
At Janet AI, security isn't just a feature—it's foundational to everything we build. Our security-first mindset drives our development processes, infrastructure decisions, and organizational policies. We treat the data entrusted to us—whether from our customers, their end users, or anyone who interacts with our organization—with the utmost care and responsibility. Security is embedded in our DNA, enabling us to deliver innovative solutions without compromising on protection.
Compliance
Resources
SOC 2 Type II Report
SOC 2 Type I Report
Baseline Hardening Policy
Right to Object Policy
Personnel Security Policy
Controls
Access control procedures
Access review of infrastructure
VPN access
Multifactor authentication
Data subject access request response remplates
Encryption of data
Data protection policy
Data transfers covered by approved safeguards
Cooperation agreements/data sharing frameworks
Data processing agreements executed and retained
Source code tool
Business continuity and disaster recovery testing
Web application firewall
Outsourced Development Management
Sample code changes
Intrusion detection tool
Infrastructure baseline hardening policy
Infrastructure firewall
Monitoring tool
Network diagram
Incident response and breach notification policy
Security incident list
Alerts and remediation
Breach notification communication
Internal GDPR compliance assessments performed
Binding corporate rules policy
Whistleblower policy
Rectification request policy
Objection handling policy and systems generated
Log management tool
Vendor management program
Vendor termination
Vendor list
Vendor onboarding
Consent for processing captured via explicit opt-in mechanisms
Age verification and parental/guardian consent process enforced
New employee and contractor agreements
Existing employee and contractor agreements
Customer onboarding
Security awareness training implemented
List of active employees & contractors as on date
Records of Processing Activities (RoPA) maintained
Multi-availability zones
Notification workflows regarding rectification or erasure maintained
Asset register maintaining
Risk management program
Lawful basis assessment
Legitimate interest assessment
Risk and Governance Executive Committee meeting minutes
Patch management
Antivirus and malware configurations
Board charter
Asset register list
Termination checklist