Security & Privacy
We’re committed to privacy and security across model selection, customization and production infrastructure.
Our commitments:
We do not train models on your data
Models within our platform may be deployed on-premise or in your virtual private cloud
You own any model customized using your data
You own your inputs and outputs
You have control over model and feature access
You control what data is retained and for how long
Data encryption at rest (AES-256) and in transit (TLS 1.2+)
SOC 2 compliance
FAQs
If your product and engineering teams wish to build custom solutions powered by leading GenAI models, try our web app.
The easiest way to get started with Konko AI is testing different models through the playground within our web app. It’s simple to use and allows developers and product teams to test the capabilities of models hosted on Konko AI’s platform.
You may access any Konko AI model via API. Learn more
You may create custom models using your business data and access them via API. Learn more
Yes, you can customize models within our platform to specific tasks by fine-tuning them with your own prompt-completion pairs.
You own models fine-tuned using your data. They are for your use alone and will never be served to anyone outside of your organization. You may access these models on the model playground or via API.
Data submitted to fine-tune a model is retained until the customer deletes the files.
You retain all rights to the inputs you provide to our services. You also own any output you rightfully receive from the services to the extent permitted by law. We only receive inputs and outputs necessary to provide you with our services, comply with applicable laws, and enforce our policies. You may learn more by reading our privacy policy.
You own models fine-tuned using your data. They are for your use alone and will never be served to anyone outside of your organization. You may access these models on the model playground or via API.
Data submitted to fine-tune a model is retained until you delete the file.
Konko AI encrypts all data at rest (AES-256) and in transit (TLS 1.2+), and uses strict access controls to limit who can access data.
Within your organization, only end users can view their conversations. Workspace owners have control over workspaces and access. Authorized Konko AI employees will only ever access your data for the purposes of resolving incidents, recovering end user conversations with your explicit permission, or where required by applicable law.
Konko AI has been audited for SOC 2 Type 1 compliance (Type 2 coming soon).
Konko AI securely retains data to enable features like conversation history. You control how long your data is retained. You may learn more by reading our privacy policy.