Security & Privacy at DoryAI

Your trust is our highest priority.

At DoryAI, safeguarding your data is fundamental to everything we do. As your AI-powered link assistant, DoryAI helps you save, tag, and organize links—without ever compromising your privacy.

We follow industry best practices for authentication, encryption, and access control, and we undergo regular third-party security reviews to ensure your data is handled with the highest standards of confidentiality and integrity.

1. Compliance & Standards

We align with globally recognized security and privacy standards to give you complete confidence:

  • Secure OAuth authentication – We integrate with trusted providers like Google for secure login and account access.
  • Encryption in transit and at rest – All data is protected using TLS 1.3 and AES-256 encryption.
  • Regular security audits – We work with independent security experts to test our systems and close vulnerabilities.

2. Data Access & Usage Principles

We believe in minimum necessary access — DoryAI only processes the information required to deliver the features you use.

  • You control what we can access – We only process the links, tags, and notes you choose to save.
  • No AI model training – Your personal data is never used to train DoryAI or any third-party AI models.
  • Your data, your rules – Delete links anytime, or delete your entire account and all stored data.
  • Immediate revocation – You can disconnect your login provider (e.g., Google) at any time via your account settings.

3. Infrastructure & Security Measures

We operate on a secure, redundant, and continuously monitored infrastructure:

  • 24/7 Security Monitoring – Our systems are monitored around the clock for suspicious activity.
  • Encryption Everywhere – All data is encrypted both in transit (TLS 1.3) and at rest (AES-256).
  • Minimal Data Retention – We avoid long-term storage of sensitive content wherever possible.
  • Regular Penetration Testing – Independent security experts test our systems for vulnerabilities.
  • Zero Trust Security Model – Every connection is verified, and access is restricted to the least privilege necessary.

4. Transparency & User Rights

We are committed to clear, transparent, and user-friendly security policies:

  • Clear Privacy Policy – Written in plain language so you can understand exactly what happens to your data.
  • Full Data Portability & Deletion – Export your saved links anytime, or request complete account deletion.
  • Audit & Governance – We maintain documented Business Continuity, Disaster Recovery, Encryption, and Incident Response policies.

5. Your Control, Always

  • Opt-in Features Only – Nothing is enabled without your explicit permission.
  • Reversible at Any Time – Disconnect DoryAI from your accounts instantly.
  • No Hidden Access – We never request or store permissions we don’t need.

Summary

Security is not an afterthought at DoryAI — it’s part of our foundation. From strict encryption standards to transparent privacy practices, we take every measure to protect your data. You remain in control of what DoryAI can access, and we’re transparent about how your information is stored, processed, and secured.

Questions?

If you have any questions about our security practices, please contact us: nmamanipantoja@gmail.com