Security & Privacy at AMA
We're committed to protecting your data and providing a secure platform for all our members.
Data Protection
We implement industry-standard encryption protocols to keep your information secure:
- HTTPS encryption for all communications
- Secure password hashing using modern algorithms
- Regular security audits and updates
- Database encryption for sensitive information
AI Access & Gateway Security
We maintain strict, transparent controls over how AI systems access our public data through our Community AI Gateway.
Security Measures:
- Authentication Required: All API requests require valid keys and purpose headers
- Training Prohibited: AI model training requires written license
- Comprehensive Logging: All access tracked with IP, user-agent, purpose, and timestamp
- Privacy Protection: No access to member-only or private content
- End-to-End Encryption: HTTPS/TLS for all data in transit
- Rate Limiting: 60/min, 1,000/hour, 10,000/day to prevent abuse
- Rapid Response: Quick takedown process via legal@amaspc.com
Our Security Practices
We collect only the information necessary to provide our services. This includes:
- Account information (name, email, password)
- Profile information (business details, marketing preferences)
- Usage data to improve our services
Your data is never sold to third parties and is only used to provide and improve our services.
Our AI marketing tools are designed with security in mind:
- Data used for AI training is anonymized and aggregated
- All AI interactions are encrypted end-to-end
- We implement strict access controls for AI systems
- Regular security audits of AI components
We partner with OpenAI, a leader in responsible AI development with robust security practices.
We implement multiple layers of protection for your account:
- Secure password storage using modern hashing algorithms
- Session management with secure cookies
- Protection against brute force attacks
- Secure password reset procedures
We recommend using strong, unique passwords and regularly updating them for optimal security.
We continuously monitor our systems for suspicious activities:
- 24/7 monitoring of our infrastructure
- Automated threat detection systems
- Regular security testing and vulnerability scanning
- Incident response team ready to address any security events
Our security monitoring ensures quick detection and response to potential threats.
Have Security Questions?
Our security team is here to answer any questions about how we protect your data.
CONTACT US