WilsonAI logoWilsonAI

WilsonAI Trust Center

WilsonAI is in compliance with security best practices, has implemented and is monitoring comprehensive controls, and maintains policies to outline its security procedures.

Compliance

Resources

Baseline Hardening Policy
Information Technology Leadership Committee Charter
Information Security Management System Manual
Board of Directors Charter
Access Control and Termination Policy

Controls

Access restricted to modify infrastructure
Remote access tool
VPN access
User list with assigned roles and privileges
Access control procedures
Encryption of data
Backup and recovery policy
Outsourced Development Management
Code repositories
Tracking of code changes
Sample code changes
Code branch protection rules
SSL/TLS certificates for infrastructure
Monitoring, measurement, analysis and evaluation
Monitoring tool
Network diagram
Infrastructure firewall
Alerts and remediation
Breach notification communication
Security incident list
Whistleblower policy
Log management tool
Vendor onboarding
Vendor management program
Vendor list
Vendor termination
Employee handbook
New employee and contractor agreements
List of active employees & contractors as on date
Existing employee and contractor agreements
List of newly hired employees & contractors
Asset register maintaining
Multi-availability zones
Risk and Governance Executive Committee meeting minutes
Risk management program
Information security policies and procedures
Key management services used
Internal communication for changes in roles
Intellectual property rights
Security-related roles

Subprocessors

Slack
SlackBusiness Apps & Productivity
Vercel
VercelCloud Infrastructure & Platform Services
Neon
NeonData Stores & Warehouses
OpenRouter
OpenRouterUnknown Category