Data Safety & Privacy

Last Updated: January 10, 2025

Our Commitment

Your privacy is fundamental to how we built Inbox Copilot. We use enterprise-grade encryption, automated AI processing, and strict access controls to protect your email data at every step.

How We Process Your Emails

Inbox Copilot uses advanced AI systems to analyze and categorize your emails. Your email content is processed by automated AI models—not by human employees—to determine priority levels, generate summaries, and organize your inbox.

Your email content and subjects are encrypted at rest using AES-256 field-level encryption. This means your data is protected even with database access—only authorized systems can decrypt and process your emails for categorization. See the Encryption section below for full details.

To provide this service, we access:

Security Architecture

Field-Level Encryption

To secure the highest standards of privacy and security, we use AES-256 field-level encryption for all email content:

Network & Infrastructure Security

Data Isolation

Data Retention & Deletion

We don't keep your data forever. Email content is stored for a maximum of 30 days, then automatically and permanently deleted. Only categorization metadata (labels, priority levels) is retained beyond this period.

Immediate deletion options:

Your Control

You have complete control over your data:

What We Don't Do

Breach Notification

In the unlikely event of a security breach, we will notify you within 72 hours of discovery, explain what happened and what data was affected, detail the steps we're taking to resolve the issue, and provide guidance on protecting your account.

Our Promise: We built Inbox Copilot because we believe AI can make email less overwhelming. But we also believe that convenience should never come at the cost of your privacy and security. Your trust is our most valuable asset.

Questions & Contact

Have questions about our security practices or found a security vulnerability? Contact us at info@aiforthebiz.com. We respond to security questions within 24 hours and take all vulnerability reports seriously.