Security at Ritual
Your decision security is our top priority
Trust Ritual to keep your data secure. We are always actively working towards enhancing our data security and meeting your compliance needs. We make a simple promise because trust is the foundation of our company and our product. Your decisions are important, and privacy and data security are our most important priority. We follow strict principles and privacy policies, going above and beyond to ensure we always meet and typically exceed industry standards for protecting your data.
Your decision security is our top priority
Infrastructure Security
Hosting & Service Providers
Hosting & Service Providers Ritual is hosted on Amazon Web Services (AWS) cloud infrastructure.
Encryption in Transit & At Rest
All of your Ritual data is sent via HTTPS with 256-bit encryption. We encrypt all at-rest data in our production database and all backup versions.
Application Security
Authentication
At Ritual we prioritize user data security, employing AWS Cognito for authentication. Cognito offers robust features like multi-factor authentication and encrypted user data. Additionally.we enhance its capabilities with a custom authorizer, introducing granular access controls tailored to each interaction. This combination delivers a streamlined authentication experience without compromising security.
Email Verification
For accounts set up with email, we verify that email address belongs to you and store your password in a secure hash according to industry standards. Permissions: At Ritual safeguarding each organization's data is fundamental. Adhering to AWS best practices, we architect data permissions in such a manner that every organization's data remains siloed and isolated by design. This ensures not only data integrity but also guarantees the privacy and security that our client organizations expect from us. By structuring permissions in this rigorous way, we eliminate risks associated with inadvertent or unauthorized data access, creating a trusted environment for all our users. In addition, Ritual has permission settings within the app for administering user roles.
Permissions
At Ritual safeguarding each organization's data is fundamental. Adhering to AWS best practices, we architect data permissions in such a manner that every organization's data remains siloed and isolated by design. This ensures not onlv data integrity but also guarantees the privacy and security that our client organizations expect from us. By structuring permissions in this rigorous way, we eliminate risks associated with inadvertent or unauthorized data access, creating a trusted environment for all our users. In addition, Ritual has permission settings within the app for administering user roles.
Operational Security
Continuous Improvement
All new product features and internal processes are peer- reviewed and evaluated for their security impact before they are released to production. We continuously monitor and improve our security practices.
Confidentiality & Authentication
Access to customer data is strictly limited to authorized employees whose job functions require it. All Ritual employees sign confidentiality agreements. Additionally, 2FA and strong password policies are used to protect access to all cloud services that touch customer data.
Security Policies & Incident Response
Ritual has comprehensive security and awareness policies, and documented security response procedures. These policies and procedures are updated as necessary, audited regularly and shared with all employees.
Security Policies & Incident Response
Backups & Data Recovery
Everything stored on Ritual is backed up daily. We have documented recovery procedures to restore from backup within an hour. You may also export your Ritual decision content via CSV at any time.
Availability
Ritual is a reliable platform trusted by our users. Leveraging AWS and serverless functions, we ensure global availability and can adapt to regional requirements. In the rare event of issues, we act promptly. Ritual boasts a scalable infrastructure and robust recovery measures.
Privacy Built-in
No Third-Party Training Usage
We specifically use OpenAI's services under policies that ensure your data is not used to train future AI models. OpenAI has explicitly stated that data sent through their APIs will not be utilized for the purpose of training their models without explicit consent. This means that the information you provide while using our services remains confidential and is not used to further train AI models.
Data Protection Policy
We have not and will not opt-in to sharing your data with OpenAI so they can train their models.