W H A T A L K E R

Please Wait WhaTalker is Loading

    Browsing WhaTalker-
  • Home
  • -Data Security Guide

Our Shared Responsibility

Strengthening Security Together

WhaTalker provides a robust and secure platform, while the client retains responsibility for data control, access management, and regulatory compliance. Security is ensured through active collaboration and a shared responsibility model.

User Trust Center

Last updated on: April 13, 2025
 

 

 

Moving Forward Together in Information Security: A Shared Responsibility

Safeguarding your information within the WhaTalker ecosystem is a collaborative commitment. Our top priority is to provide you with a robust, secure, and highly available platform—while you retain full control over your data security and configuration management.

 

Your Responsibility

 

Data Ownership and Management

  • You are solely responsible for the control of the data stored and shared through WhaTalker—including who accesses it, for how long, and under what conditions.
  • You must ensure the accuracy, legality, and relevance of all information handled within your WhaTalker environment.
  • We strongly recommend periodically reviewing and deleting outdated or unnecessary data to reduce risk exposure.

 

Credentials and Access Control

  • Use strong, unique passwords for every user account.
  • WhaTalker may be configured to enforce Multi-Factor Authentication (MFA) automatically, without requiring user action.
  • The second authentication factor is delivered via email, sending a verification code to ensure only the legitimate account owner gains access.
  • If automatic enforcement is not active, users can manually enable MFA from their security profile at any time.
  • Regularly audit access privileges to ensure they are strictly aligned with each user’s role and level of responsibility.

 

Device and Access Point Security

  • Secure all devices that access WhaTalker by keeping them updated with the latest operating system and security patches.
  • Immediately notify WhaTalker if you detect unauthorized access or suspect a device compromise.

 

Shared Responsibilities

 

Identity and Access Management

  • WhaTalker provides the technical infrastructure for user management, including advanced authentication methods.
  • You are responsible for configuring access policies, managing user accounts, and applying best practices such as enabling MFA.

 

Data Protection and Regulatory Compliance

  • WhaTalker encrypts your data both in transit and at rest using industry-leading security standards.
  • It is your duty to define the sensitivity level of your data within your own organization and ensure compliance with the data protection and privacy regulations applicable to you.
  • While WhaTalker provides the tools for secure management, proper and lawful use remains the client’s sole responsibility.

 

Incident Response and Reporting

  • WhaTalker is committed to notifying you promptly of any security incident affecting your account and taking corrective actions as needed.
  • As a client, you are expected to report suspicious activities immediately and to cooperate fully during any investigation process.

 

Backups and Data Recovery

  • WhaTalker maintains reliable backup mechanisms designed to ensure platform stability and recovery in case of technical failure.
  • These backups support optimal system performance in the event of operational incidents.
  • However, any data deleted by the client from their own account is not retained in WhaTalker’s backups, as each user has full autonomy over their environment.
  • Clients are responsible for implementing additional backup strategies if they wish to preserve deleted or modified information within their account.

 

WhaTalker’s Responsibility

 

Infrastructure Security

  • We ensure the protection, stability, and availability of our core infrastructure.
  • Our systems are safeguarded with comprehensive network controls such as firewalls, intrusion detection, and strict access policies.

 

Operational Continuity

  • Our platform is built for high availability and business continuity through redundancy and failover systems.
  • We conduct continuous monitoring to detect threats proactively and minimize downtime.

 

Physical Security

  • WhaTalker’s infrastructure is hosted in data centers operated by trusted providers such as Contabo and InMotion Hosting, who enforce rigorous physical security protocols.
  • These facilities feature restricted access, 24/7 monitoring, biometric controls, and protection against natural disasters, in compliance with international standards.
  • We carefully select infrastructure providers that operate in certified, secure environments with recognized physical and operational safeguards.

 

A Commitment to Excellence—Together

Effective security stems from a clear understanding of roles and active collaboration. By fulfilling our respective responsibilities, we collectively ensure that the WhaTalker environment remains secure, efficient, and ready to support your growth.

If you have questions or require further guidance, feel free to contact our security team at: 📧 security@whatalker.com

 

A chatbot with artificial intelligence? Exactly — it works 24/7 with no coffee and zero complaints ☕😴. It handles your customers in seconds while you close a sale… or celebrate one. 🥂🤖

This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.