Appearance
Introduction
You are here.
Your life clearly didn't turn out the way you imagined. Don't worry, we'll make this as painless as possible so you can go back to fulfilling your real dreams. If your dreams include infosec, please send us an email immediately to support@syntheticusers.com We can help.
About
Synthetic Users is committed to transparency and trust in AI-powered user research. This site contains all legal, security, compliance, and operational documentation for our platform.
Top Enterprise Documents
Large enterprise companies most commonly request these documents during vendor security assessments:
- SOC 2 Compliance - Our SOC 2 Type 2 certification and compliance documentation
- Data Processing Addendum (DPA) - GDPR-compliant data processing agreement for enterprise contracts
- Security Policy Document - Comprehensive security policy covering all aspects of our security posture
- Subprocessors and Data Flow - Complete list of third-party subprocessors and data flow documentation
- Business Continuity Plan - Plans and procedures for maintaining operations during disruptions
Quick Links
- Privacy Policy - How we collect, use, and protect personal data
- Terms of Service - Terms and conditions for using the Synthetic Users platform
- Acceptable Use Policy - Rules and guidelines for using our services
- Cookie Policy - Information about our use of cookies and similar technologies
Documentation Overview
This site contains all legal, security, compliance, and operational documentation for Synthetic Users. Use the sidebar to navigate through the different categories:
Legal Information
Public-facing legal documents including Privacy Policy, Terms of Service, Cookie Policy, and Acceptable Use Policy.
Security Policies
Policies and procedures for maintaining security, including access controls, encryption, incident response, password management, and vulnerability management.
Compliance & Certifications
Compliance documentation including SOC 2 certification, SSL/TLS configuration, penetration testing reports, and cyber insurance.
Business Continuity
Comprehensive plans for maintaining operations during disruptions, including business continuity plans, disaster recovery procedures, and crisis management.
Development & Operations
Development policies, configuration guides, and operational procedures including secure SDLC, SSO configuration, and permission systems.
Data Management
Policies related to data processing, retention, and subprocessors, including the Data Processing Addendum and data deletion procedures.
Employee Policies
Employee conduct, training, and human rights policies including code of conduct and security awareness training.
Risk Management
Risk assessment and management frameworks including third-party risk management and target operating model.
Product Documentation
Product-related documentation including feature lists and historical pricing information.
Security Documentation
Comprehensive security policy document covering all aspects of Synthetic Users' security posture.
Our Commitments
Privacy First
We are committed to protecting your data and your users' privacy.
Clear Terms
Straightforward agreements for using our platform and SDKs.
Compliance
Built with global standards and best practices in mind.
Security
Comprehensive security policies and procedures for protecting data and systems.
Business Continuity
Plans and procedures for maintaining operations during disruptions.
Risk Management
Frameworks for assessing and managing third-party and operational risks.