📣 Just Released!
Voice of the Customer Insights, the Generative AI solution that surfaces actionable insights from all your contact center conversations
Omniscient AI is Coming to Your Contact Center: Announcing QA-GPT by Level AI

End to End Security Embedded In All Workflows Security is Top Priority For Us

Level AI satisfies the requirements for GDPR, HIPAA, SOC 2, PCI and ISO 27001 compliance

pci compliance level ai

Key Security Features

PII Redaction

Level AI prioritizes customer privacy. Sensitive information like name, addresses and credit card numbers are automatically redacted

Penetration Testing

We closely work with the security researchers to identify any vulnerabilities in our application and infrastructure using guidelines from the OWASP Application Security Verification standard and ISO27001

Role Based Access Control

We limit access to data by role based access control (RBAC) with audit logs. Access to customer data follows the principle of least privilege. 

Secure SDLC

Level has policies around secure development lifecycle (SDLC). Code reviews are mandatory, and every developer is required to learn and apply the best security practices.

Data Encryption

All customer data is encrypted both at rest and during transit. The data passed between Level and third party applications is always encrypted.

Secure Infrastructure

Our GCP based infrastructure is secured using rigorous vulnerability testing. Access to servers is resources is managed by the principle least privilege using IAM policies.

PCI Compliance

Level is PCI Compliant -it has met all the criteria for securing and protecting cardholder data and has been audited for it. 

Frequently Asked Questions

Security &
Infrastructure

Is Level AI’s data center secure?

Our Infrastructure is hosted on GCP, and we meet the requirements of a number of certifications that ensure the confidentiality, security and integrity of our data.

Does Level AI perform regular penetration tests?

We work closely with security researchers to identify vulnerabilities in our application and infrastructure that attackers could exploit. All the vulnerabilities are resolved by our team.

Policies &
Procedures

What are some of the security policies that Level follows:

We maintain security policies that cover the following key areas:
- Data classification
- Data retention and disposal
- Change management
- Information security
- Encryption and key management
- Security Incident Response

Is security a part of onboarding?

All Level employees and contractors receive formal security training as a part of their onboarding, which includes a review of all the Level policies.

Access &
Control

How is cloud access managed?

Cloud access is managed using 2FA for accounts. The servers can only be accessed over the VPN. We maintain an extensive audit trail for all key operations.

Who has administrative access to our database?

Only a small number of engineers are permitted to have access to the backend database. This access is managed using IAM policies.

Make your Customers Love your Agents Again!