Security Practices

The security and privacy of your data are of utmost importance to us. We are continuously identifying and implementing state-of-the-art security practices for our online whiteboard platform.

Try Jeda AI Now

Data and Information

Encryption

Qualys' SSL Labs rated Jeda AI's SSL implementation an "A" on their SSL Server test.

​Password Hashing

We are using AWS Cognito with SRP authentication, key-exchange protocol, and SHA hash functions.

Backup Policy

Account Verification
Users are required to validate their accounts via a confirmation code provided in an automated e-mail.

Infrastructure

Secure Infrastructure
Our cloud provider is Amazon AWS. We utilize a 100% serverless architecture, overlaying, and augmenting AWS compliance and security programs. We designed our architecture to follow international security standards and regulations while protecting confidentiality, data sovereignty, and data privacy regulations. We leverage AWS tools to set up firewall rules, intrusion, and DMZ policies.

Real-Time Monitoring
We employ AWS CloudWatch for Application and Infrastructure monitoring.


Logging
We use several AWS services for logging, including:

Sub-processors

We work with the following companies and tool systems to store, analyze, and transmit data for our users. They've been carefully vetted for best-in-class privacy, security practices, and compliance practices.

If you have any questions about our security practices, please contact.