Revised: 1/8/2024
Encore is a technology company dedicated to multiplying the impact of the world’s top coaches and managers. We’re a team of machine learning scientists using the latest advancements in AI to eliminate administrative drudgery and let you focus on the great work that only you can do.
We appreciate the sensitivity and confidentiality of the customer data required to provide our services. Below you will find an outline of our policies and practices in more detail.
Data Privacy / Security
Data Security is the practice of ensuring the confidentiality and security of customer data.
- We leverage OpenAI’s APIs to enable our AI features.
- OpenAI does not use your data to train their models and it is deleted from their systems within 30 days.
- In the future, we may offer features that leverage fine-tuned models trained on your data.
- These features will be opt-in, and your data will never be used to train a model for another customer without your explicit consent.
- We do not sell your data or use it for any purpose other than to provide you our services.
- At any time, you may delete your organization, which will permanently delete all data you’ve uploaded into our system within 30 days.
Infrastructure Security
Infrastructure Security is the practice of protecting critical infrastructure from physical and cyber threats.
- Our application services and databases are hosted by Render, a cloud application hosting provider built on top of Google Cloud and AWS.
- All customer data storage is encrypted at rest using industry standard encryption (AES-256).
- All data between your browser and our servers is encrypted in transit (TLS 1.2+).
- We leverage Cloudflare to provide automated and manual DDoS mitigation.
- Access to our production system is protected behind a corporate VPN.
Application Security
Application Security is the practice of ensuring software is secure throughout it’s entire lifecycle (design, development, and deployment).
- We perform internal code reviews and have a standardized process for how changes are deployed to production.
- All API endpoints leverage role-based access controls (RBAC).