Trust Center

Start your security review
View & download sensitive information
Ask for information
Search items
ControlK

Welcome to Ada's Trust Center!

Security and privacy is at the forefront of everything we do at Ada. This page is intended to assist customers (or curious minds) with exploring our security, privacy, and compliance practices.

Ada's Information Security Program primarily follows Center for Internet Security Cybersecurity Framework v8.0 (CIS 8.0) practices to maintain a strong security posture, and consists of a full complement of corporate policies, procedures, plans, and guidelines which are reviewed and updated annually.

For access to restricted information please request access using the "Request Access" button located throughout this page. Please provide an Ada point of contact in order to receive full access as part of your request, otherwise only limited access will be provided.

Ada Security Team Email: security@ada.support

Ada Data Protection/Privacy Officer Email: dpo@ada.support

Ada Privacy Email: privacy@ada.support

Canva-company-logoCanva
Wealthsimple-company-logoWealthsimple
Pinterest-company-logoPinterest
Afterpay-company-logoAfterpay
Square-company-logoSquare
Intuit Mailchimp-company-logoIntuit Mailchimp
IPSY-company-logoIPSY
Verizon-company-logoVerizon
Weber-company-logoWeber
YETI-company-logoYETI

Documents

2022 Penetration Test Report
Knowledge Base (FAQ)
Trust Center Updates

Sub-processor Change Notice

SubprocessorsCopy link

Starting as early as September 26, 2024, Ada intends to make the following changes to our sub-processors which may process personal data as defined under the EU General Data Protection Regulation (GDPR), California Consumer Privacy Act (CCPA) and other applicable laws.

  • CHANGE: New Sub-processor
  • EFFECTIVE DATE: September 26, 2024
  • SUMMARY: Post hog is a third-party analytics provider that Ada uses to capture how users interact with the agent builder ui. Ada uses this information to analyze user behavior and improve the services.

Further details can be found on Ada's sub-processor page (https://www.ada.cx/subprocessors)

Published at N/A

If you need help using this Trust Center, please contact us.

If you think you may have discovered a vulnerability, please send us a note.

Powered bySafeBase Logo