Information Security

FAQs

Table of contents

Detailed description of processes, controls, and safeguards

The platform receives and transmits recordings via SFTP and secure APIs, ensuring end-to-end encrypted transfer. In addition, all communications use TLS 1.3/SSL, ensuring confidentiality and integrity when sending audio or other files. The procedures used are SFTP and APIs encrypted under HTTPS/TLS 1.3.

The platform implements role-based access control (RBAC) under the principle of least privilege, applicable to all processes, including data transfer. Furthermore, any access requires robust authentication, and connections are protected by MFA and secure credentials. This ensures that only authorised users can access sensitive information during transmission.

The platform protects all transmissions using TLS 1.3/SSL and mutual certificate validation, preventing interception or tampering in transit. In addition, transfers via SFTP and encrypted HTTPS APIs ensure integrity and authenticity. The architecture incorporates firewalls, IDS/IPS, and network segmentation, mitigating MITM attacks and unauthorised access.

Yes, transfer procedures are designed to handle large volumes of files without compromising security. eAlicia’s architecture uses asynchronous transfers encrypted by SFTP and APIs, designed to process large volumes of audio, text, and images without affecting security. The entire transfer is protected by TLS 1.3/SSL, along with network segmentation and perimeter controls. In addition, the acquisition and processing mechanisms are modularised and orchestrated, allowing high loads to be handled without compromising data protection.

Established procedures for patch management, anti-malware solutions, use of encryption for data in transit, and backups

Patch management procedures are applied that prioritise security patches on systems that process Confidential Information (ICF) or Personal Data (DTPS), maintaining records of all audit, monitoring and security activities for 120 days and allowing for verification of the correct application of updates. These processes are integrated into a secure environment with strict access controls, ensuring that patches are installed in a controlled manner.

Patches are prioritised when they are security-related, and in other cases, every three months. Audit, monitoring, and security records are kept for 120 days, allowing verification that patches were applied correctly.

The platform maintains separate development, testing and production environments, which means that changes and updates — including patches — are first validated in non-production environments. In addition, the CI/CD model requires unit, functional and integration testing and security reviews prior to any production deployment. Therefore, controls in place to ensure that patches are tested and validated in advance.

The platform is continuously monitored 24/7 by the SOC and systems such as IDS/IPS, PRTG and centralised logs, which involves ongoing security and infrastructure analysis. In addition, internal audits, pentesting and periodic risk assessments are carried out to detect vulnerabilities. Although no particular frequency is specified for each system, the security policy confirms continuous and recurring controls across the entire infrastructure.

Backup media are encrypted, and data in transit uses TLS 1.3 with 2048-bit RSA key exchange. In addition, credentials are encrypted using AES-256. Data is stored encrypted at rest.

All backups are encrypted. TLS 1.3 + RSA-2048 is used for data in transit and AES-256 for credentials. Therefore, backups are encrypted.

Access to encryption keys is restricted exclusively to authorised IT personnel, following strict security controls. Only these profiles can manage them, applying RBAC, the principle of least privilege and segregation of duties, ensuring that no other user or area has access to these keys. In addition, all actions related to their use or administration are recorded and audited to ensure traceability and control.

All data in transit is encrypted using TLS 1.3 with 2048-bit RSA, including internal transfers between servers and flows to/from backup systems. In addition, communications between zones in the architecture use SSL certificates and mutual validation, ensuring integrity and confidentiality. Therefore, mandatory encryption does exist for all data in transit, including backup-related data.

TLS 1.3 with RSA-2048 and AES-256 encryption is used for credentials, in line with industry standards and frameworks such as GDPR, ISO 27001, ENS, SOC 2, and NIST SP 800-53. The encryption complies with the aforementioned security and data protection frameworks and regulations (GDPR, LOPDGDD, AI Act, etc.).

In the event of loss or compromise of an encryption key, an internal incident response procedure is implemented, managed by the IT team. This process includes immediate revocation of the affected key, its secure rotation/regeneration, and verification that there is no impact on data integrity or availability. All actions are logged and audited, ensuring traceability and compliance with security policies.

Independent databases with logical separation to isolate environments and ensure greater security in development and operation processes.

Each customer’s data is stored in separate databases, and there are separate development, pre-production, and production environments, with their corresponding control mechanisms: firewall policies, schema separation, specific VLANs, and RBAC controls per instance.

Access is protected by role-based access control (RBAC), applying the principle of least privilege to limit which users can enter each environment or database. In addition, robust authentication is required, including strong passwords and locking after failed attempts. All accesses are logged and audited, restricted only to roles defined for each system or resource.

Yes. We have sub-version and system logs.
The servers maintain audit, monitoring, and security logs for 120 days, including accesses, insertions, and data modifications. In addition, the platform has continuous monitoring (SOC/NOC 24/7) and centralised logs to detect unauthorised changes or accesses. All logs are restricted by roles and are part of the internal audit and compliance processes.

Each separate environment protects sensitive data through encryption at rest and in transit (TLS 1.3, RSA-2048), along with role-based access control (RBAC) that strictly restricts who can view or modify information. In addition, all actions are recorded in auditable logs, and personal data is treated with anonymisation/pseudonymisation before any processing.

The platform has an internal SOC that monitors 24/7, generating automatic alerts for any anomaly or incident in any separate environment. In addition, there are documented incident management and response procedures, aligned with ISO 22301 and ISO 27001, which include analysis, containment, and customer communication. All events are recorded in auditable logs, allowing for complete investigation and traceability.

Critical aspects for the protection of AI-based systems. Additional information on security controls and practices.

Anonymisation is carried out using automatic processes that detect patterns and entities that identify personal data and replace them with irreversible identifiers. This substitution is adapted to each case, upon request, according to the information to be protected (e.g. account numbers, ID numbers, numerical codes, proper names, dates or sensitive references such as medical information). When requested by the customer, this data may also be pseudonymised before processing.

AI models are isolated on the private network, with no connection to external services, and protected by network segmentation, firewalls, WAF, and IDS/IPS. Access is controlled through RBAC, MFA, and least privilege policies, with full traceability of all actions. All communications are encrypted with TLS 1.3/SSL, and changes go through secure CI/CD with validation and vulnerability scanning. In addition, a 24/7 SOC monitors any intrusion or tampering attempts. Only authorised IT department personnel have access to servers with AI models.

Integrity and confidentiality are ensured through isolated environments, segmentation between training/validation/production, TLS 1.3/SSL encryption, and RBAC+MFA access control. Deployments go through secure CI/CD with auditing and vulnerability scanning, and a 24/7 SOC monitors for any anomalies or tampering attempts.

Yes, at least monthly. eAlicia performs periodic risk assessments, ethical audits, and bias reviews on all AI models, including generative, analytical, and transcription models. These analyses seek to detect vulnerabilities, deviations, discriminatory biases, or anomalous behaviour. In addition, monthly calibrations and validations with human supervision are applied to ensure security and fairness. All of this is part of a formal programme of continuous monitoring and compliance with the AI Act and GDPR, preventing accidental exposure of sensitive data.

At the customer’s request (not necessary in all cases), anonymisation is performed prior to sending data to AI models, replacing all personal data with irreversible identifiers. In addition, ethical audits, periodic bias reviews and human supervision are applied, ensuring that no sensitive data remains embedded or residual in the models.

There is no need to apply differential privacy because models are not trained with customer data. Queries to the models (LLMs) are used solely to analyse the context received at that moment, without any retention or learning about that information. Furthermore, the data can be anonymised beforehand, and the analysis focuses exclusively on the behaviour of the agents, the conversations and the quality of the interactions, avoiding any risk of exposure.

Compliance is guaranteed by a fully isolated architecture, where all data is processed exclusively within our private network and never sent to external services. Queries to the models are made solely from eAlicia’s internal processes, with no possibility of external access, ensuring absolute control over the flow of information. Furthermore, when requested by the client, data can be anonymised or pseudonymised before processing, reinforcing privacy protection and compliance with regulations such as GDPR and LGPD.

Open source and proprietary models working locally.
Our AI is based on auditable open-source models (Whisper, Llama, Mistral) and proprietary models trained internally, all running exclusively on our servers within the data centre. The underlying technology uses frameworks such as PyTorch, TensorFlow and HuggingFace, installed locally and without connection to external services. We do not use third-party APIs or public clouds, so no data is sent outside our infrastructure. All processing is carried out in private, isolated environments under our complete control. This guarantees total confidentiality and data sovereignty.

The tool is closed by design, because all AI models run solely on our private, isolated infrastructure with no connection to external services. Each client’s data is processed in logically separate instances, with independent databases that prevent any mixing between projects. There is no continuous training or cross-learning: the models do not reuse information or incorporate customer data into their internal operations. All access is regulated by RBAC, auditing and authorisation circuits, ensuring that only authorised personnel can interact with the environments. In addition, contractual commitments reinforce that customer information is used exclusively for their own service and is never shared or applied outside their perimeter.

The platform protects models through total isolation on the private network, without exposure to external services, along with strict segmentation between training, validation and production. It also uses firewalls, WAF, IDS/IPS, TLS 1.3 encryption, RBAC, MFA and 24/7 SOC monitoring, preventing unauthorised access or extraction attempts. Finally, ethical audits, periodic bias reviews, and complete traceability of the model lifecycle ensure that sensitive information cannot be inferred or extracted.

Formal guidelines governing the secure storage and disposal of sensitive information in a controlled manner and in accordance with regulatory requirements.

Yes. A distinction is made between original recordings and processed data, each with different retention policies (e.g., audio recordings for a maximum of three months and data only for auditing purposes). Therefore, it is necessary to have a detailed understanding of both policies to ensure secure deletion and regulatory compliance. Data is securely deleted at the end of the contract or when requested by the customer, ensuring compliance with GDPR and LGPD.

Audio recordings are kept for a maximum of 3 months and may only be kept longer if the client expressly requests it. Processed data (transcripts, analyses, etc.) are only kept for as long as necessary for the purpose of the audit. Any extension of this period requires the client’s explicit request and authorisation.

Yes, calls are recorded.
The platform uses AI transcription models installed and run locally, within the private environment and without sending information to external services.
The models used are open-source Whisper-type models, as well as variants and specific models developed internally, all run exclusively on eAlicia’s private infrastructure. These models process the audio within the data centre, without connection to third parties and under total control of the data flow.

The platform ensures secure disposal through verifiable destruction of data once its purpose has been fulfilled, including certified reports when requested by the customer. In addition, backups are immutable, encrypted and subject to limited retention, ensuring that no residual data remains after its life cycle. The process is carried out within private and controlled environments in accordance with GDPR, LOPDGDD and ISO 27001.

Backups are only kept for the defined period (90 days) and are then deleted in accordance with internal continuity and security policies. The copies are immutable, encrypted and periodically verified, ensuring that no information remains beyond the authorised cycle. Therefore, yes: the deletion process includes the removal of data from backups once their retention period has expired. Data is securely deleted at the end of the contract or when requested by the customer, ensuring compliance with GDPR and LGPD.

QUERIES RELATED TO INFRASTRUCTURE AND TECHNOLOGICAL ARCHITECTURE

The servers are housed in a data centre, which only the CTO and selected technicians can access, using an access card and physical key.
The data centre maintains a secure environment through advanced certifications and standards (ISO 27001, ENS high, GDPR, ISO 22301, ISO 27017), as well as reinforced physical infrastructure, biometric access control, CCTV and 24/7 surveillance. It also uses fire detection, electronic doors, biometric scanners and burglar alarms, ensuring perimeter protection. All access is documented and controlled, ensuring traceability and continuous compliance.

Backups are stored on the data centre’s own NAS, and a second copy is also made at an alternative geographical location. In terms of critical infrastructure, the platform maintains replicated backups between the VODAFONE and COLT data centres, located in Barcelona and Madrid, ensuring resilience and continuity.

We do not use tapes. Backups are stored on the data centre’s own NAS, which means storage based on disks/storage arrays, not tapes. In addition, there is a second copy in an alternative geographical location, also managed on similar storage infrastructure.

More information

Download PDF for further information on Safety.