How we handle your data. In plain English.
The short version: we mirror your tools’ permissions exactly, we never train on your data, and every employee has a self-service dashboard showing what Pulse knows about them. Six specific commitments below, and the long-form policy / DPA available on request.
Permission-aware, never permission-expanding
Pulse mirrors each source system's ACLs at retrieval time. We physically cannot show you a doc you couldn't see in Slack, GitHub, Notion, Linear, or your calendar. There is no admin override that bypasses this.
Your data is never used to train models
Anthropic, OpenAI, Azure, and Bedrock all offer no-training endpoints. Pulse uses only those endpoints, with explicit no-training contracts with each provider. Bring-your-own-key gives you the audit trail directly.
Confidential mode for sensitive material
Tag any thread, doc, or issue as confidential and Pulse skips ingestion entirely. Used by HR for personnel matters, legal for privileged work, leadership for pre-decisional drafts.
Personal data dashboard for every employee
Self-service. Every employee can see exactly what's indexed about them, what's been inferred, every AI retrieval that included their data. No admin gatekeeping required.
Selective amnesia · right to be forgotten
Mark anything (a thread, a doc, a topic) for deletion. Pulse purges the embeddings, drops the entity references, and re-synthesizes adjacent answers around the gap. The action is auditable; the data is gone.
Audit log for every retrieval
Every Ask query, every retrieval, every weighting decision is logged with the user, timestamp, and sources touched. Programmatic REST API calls and outbound webhook deliveries appear in the same audit log alongside in-app activity. Available to admins for compliance and to individual users for their own activity.
The compliance specifics most reviewers ask about.
GDPR DSAR (data-subject access requests) handled within 30 days.
DPA available on request, covering EU and UK transfers under SCCs and IDTA.
SOC 2 Type II audit in progress. Type I report available now.
Data residency: US (us-east-1), EU (eu-west-1), India (ap-south-1).
Sub-processors disclosed and reviewed quarterly. List available on request.
Breach notification within 72 hours of confirmation.
Pick where your data lives. We don’t move it.
Each workspace selects a region during admin onboarding (US, EU, or India). All embeddings, entity records, and audit logs stay in that region. Cross-region transfer requires explicit admin authorization and is logged for compliance.
For the full policy, DPA, or compliance questions.
The full privacy policy with all sub-processor disclosures, retention schedules, and DPA templates is available on request. Reach our security team directly: