1. INTRODUCTION
This Information Security Policy outlines the measures and
practices implemented by Tablender Inc. to protect the
confidentiality, integrity, and availability of information
processed through the Tablender platform. This document
specifically addresses how user-uploaded files are handled
within our system.
2. FILE HANDLING AND STORAGE
2.1 Temporary File Existence
All files uploaded to the Tablender system exist only
temporarily on our servers. These files are maintained solely
for the duration necessary to complete the requested processing
operations and are automatically deleted thereafter.
2.2 Processing Purpose
User-uploaded files are utilized exclusively for the purpose of
executing the specific processing tasks requested by the user.
The system processes these files in a secure, isolated
environment.
2.3 No Persistent Storage
Neither the original files uploaded by users nor the resulting
output files are permanently stored on Tablender servers. Once
processing is complete and results are delivered to the user,
all associated files are permanently deleted from our systems.
3. DATA PROTECTION COMMITMENTS
3.1 No Third-Party Sharing
Due to the ephemeral nature of data within our system, Tablender
Inc. does not share any user-uploaded files or derived
information with any third parties. This includes but is not
limited to business partners, service providers, or other
external entities.
3.2 No Training or Model Development
User-uploaded files and resulting outputs are never used to
train, improve, or develop machine learning models or any other
algorithmic systems. The data exists solely for the purpose of
completing the user's requested task.
3.3 Data Isolation
Each user's processing task is conducted in isolation, ensuring
that there is no cross-contamination of data between different
users or different processing tasks.
4. SECURITY MEASURES
4.1 Encryption
All data in transit to and from Tablender servers is encrypted
using industry-standard protocols. Processing operations are
conducted in secure environments with appropriate access
controls.
4.2 Access Controls
Only authorized system processes have access to user files
during the processing period. Human access to these files is
strictly limited, monitored, and logged.
4.3 Automated Deletion
Our systems implement automated deletion protocols that ensure
all user data is completely removed once processing is complete
or if processing is abandoned or terminated.
5. COMPLIANCE AND VERIFICATION
5.1 Incident Response
In the unlikely event of a security incident involving user
data, Tablender Inc. is committed to prompt notification and
transparent communication with affected users in accordance with
applicable laws and regulations.
6. USER RESPONSIBILITIES
6.1 Sensitive Information
Users are advised not to upload files containing highly
sensitive personal or confidential information unless absolutely
necessary for the required processing.
6.2 Local Backups
Users are encouraged to maintain their own backups of important
files, as Tablender Inc. does not maintain copies of files after
processing is complete.
7. POLICY UPDATES
This policy may be updated periodically to reflect changes in
our practices or legal requirements. Users will be notified of
significant changes.
Last Updated: April 15, 2025