Data Security Commitment
APIYI places high importance on user data security and has adopted multiple measures to protect your information. We are committed to providing users with safe and reliable AI relay services.Core Security Measures
End-to-End Encryption
TLS 1.3 Encrypted TransmissionAll data transmission uses TLS 1.3 protocol encryption, ensuring data security during transmission:
- Latest encryption standard providing strongest security protection
- Prevents data from being stolen or tampered with during transmission
- End-to-end encryption protection, fully encrypted from user to server
Minimized Data Storage
Relay Platform Positioning Core advantages of APIYI as a relay platform:- Does not store request content: Does not save your API request content (input and output)
- Does not view user data: Technical team cannot view specific conversation content
- Immediate transfer and deletion: Content data cleared immediately after request processing
- Privacy first: Maximum protection of user privacy
Why choose minimized storage?As a relay platform, our responsibility is to safely and efficiently forward requests, not to store user data. This design fundamentally protects your privacy and security.
Limited Log Recording
Basic Log Scope We only record basic information necessary for billing and troubleshooting:- Model name used: For billing and service statistics
- Token length statistics: Input and output Token counts
- Request timestamp: For log analysis and troubleshooting
- Response status: Success or error status recording
Content explicitly not recorded
- ❌ Specific conversation content
- ❌ User input text
- ❌ AI output specific replies
- ❌ Image or file content
- ❌ Personal identification information
Short-term Log Retention
7-Day Retention PolicyLog Retention Time
Retention Period: Only 7 DaysFor the following considerations:
- Data Security: Reduce data leakage risk
- Resource Optimization: Disk space costs money too~~ 😊
- Privacy Protection: Minimize data retention time
- Compliance Requirements: Comply with data protection regulations
Access Control Mechanism
Strict Permission Management
Authorized Access System- Least Privilege Principle: Only authorized technical personnel can access logs
- Anonymization Processing: Accessed log data has been anonymized
- Necessity Review: Access only in necessary situations such as troubleshooting
- Operation Recording: Complete audit logs for all access operations
Technical Team Management
- Background Check: Technical personnel undergo strict background investigation
- Confidentiality Agreement: Sign strict data confidentiality agreements
- Regular Training: Receive data security and privacy protection training
- Permission Rotation: Regularly rotate and review access permissions
Security Assurance System
Regular Security Audits
Continuous Security ImprovementSecurity Assessment ContentAPIYI team regularly conducts comprehensive security assessments:
- System Vulnerability Scanning: Regularly check system security vulnerabilities
- Code Security Review: Review potential security risks in code
- Infrastructure Inspection: Evaluate server and network security
- Process Optimization: Continuously improve security management processes
Compliance Assurance
Regulatory Compliance Commitment- Data Protection Regulations: Strictly comply with GDPR, Personal Information Protection Law, etc.
- Industry Standards: Meet AI service industry security standards
- Regulatory Requirements: Cooperate with supervision and audit by relevant authorities
- International Standards: Reference ISO 27001 and other international security standards
Security Best Practices
User-Side Recommendations
Recommendations to Enhance Security
-
API Key Management
- Regularly rotate API Keys
- Don’t hardcode Keys in code
- Use environment variables to store sensitive information
-
Sensitive Information Handling
- Avoid including sensitive personal information in requests
- Use desensitized data for testing
- Handle business confidential content carefully
-
Network Security
- Use HTTPS protocol to access API
- Use service in secure network environment
- Update client software timely
Platform-Side Assurance
- Multi-layer Protection: Deploy multi-layer security protection measures
- Real-time Monitoring: 24/7 security monitoring and threat detection
- Emergency Response: Establish complete security incident response mechanism
- Backup Recovery: Regular backup and disaster recovery drills
Transparency Commitment
Security Event Notification
If an event occurs that may affect user data security, we commit to:- Timely Notification: Notify users within 24 hours of discovering security event
- Detailed Explanation: Provide event details and scope of impact
- Solutions: Explain remedial measures taken
- Prevention Measures: Share subsequent prevention and improvement measures
Technical Support
If you have any questions about data security, welcome to contact our technical support team:Technical Support Contact
Technical Customer Service
- WeChat: 8765058
- Email: [email protected]
- Data security policy explanation
- Privacy protection measures description
- Security best practice guidance
- Security incident reporting and handling