Skip to content

Introduction

You are here.

Your life clearly didn't turn out the way you imagined. Don't worry, we'll make this as painless as possible so you can go back to fulfilling your real dreams. If your dreams include infosec, please send us an email immediately to support@syntheticusers.com We can help.

About

Synthetic Users is committed to transparency and trust in AI-powered user research. This site contains all legal, security, compliance, and operational documentation for our platform.

Top Enterprise Documents

Large enterprise companies most commonly request these documents during vendor security assessments:

  1. SOC 2 Compliance - Our SOC 2 Type 2 certification and compliance documentation
  2. Data Processing Addendum (DPA) - GDPR-compliant data processing agreement for enterprise contracts
  3. Security Policy Document - Comprehensive security policy covering all aspects of our security posture
  4. Subprocessors and Data Flow - Complete list of third-party subprocessors and data flow documentation
  5. Business Continuity Plan - Plans and procedures for maintaining operations during disruptions

Documentation Overview

This site contains all legal, security, compliance, and operational documentation for Synthetic Users. Use the sidebar to navigate through the different categories:

Public-facing legal documents including Privacy Policy, Terms of Service, Cookie Policy, and Acceptable Use Policy.

Security Policies

Policies and procedures for maintaining security, including access controls, encryption, incident response, password management, and vulnerability management.

Compliance & Certifications

Compliance documentation including SOC 2 certification, SSL/TLS configuration, penetration testing reports, and cyber insurance.

Business Continuity

Comprehensive plans for maintaining operations during disruptions, including business continuity plans, disaster recovery procedures, and crisis management.

Development & Operations

Development policies, configuration guides, and operational procedures including secure SDLC, SSO configuration, and permission systems.

Data Management

Policies related to data processing, retention, and subprocessors, including the Data Processing Addendum and data deletion procedures.

Employee Policies

Employee conduct, training, and human rights policies including code of conduct and security awareness training.

Risk Management

Risk assessment and management frameworks including third-party risk management and target operating model.

Product Documentation

Product-related documentation including feature lists and historical pricing information.

Security Documentation

Comprehensive security policy document covering all aspects of Synthetic Users' security posture.

Our Commitments

Privacy First

We are committed to protecting your data and your users' privacy.

Clear Terms

Straightforward agreements for using our platform and SDKs.

Compliance

Built with global standards and best practices in mind.

Security

Comprehensive security policies and procedures for protecting data and systems.

Business Continuity

Plans and procedures for maintaining operations during disruptions.

Risk Management

Frameworks for assessing and managing third-party and operational risks.

Released under the MIT License.