Our Approach
Security & Privacy
Temboo is built for developers working on real systems. Those systems often involve proprietary code and sensitive intellectual property. We take that responsibility seriously.
This page explains the safeguards we have in place to protect customer information.
Prompt Handling & Data Use
Prompt retention
We may retain prompts and related metadata for up to 30 days for the purposes of security monitoring, abuse prevention, and operational troubleshooting.
These logs help us detect misuse of the service, investigate issues, and ensure the platform is operating correctly.
No model training on customer data
Customer prompts and project data are not used to train underlying foundation models, nor are they used to improve or fine-tune Temboo’s systems. When Temboo uses third-party model providers, we rely on their API-based offerings, which do not use request data for model training.
Zero data retention (by request)
For eligible customers, we offer a zero data retention account configuration, where prompts and related data are not stored beyond what is required to fulfill the request. If this is important for your organization, please
contact us to discuss your options.
Intellectual property
You retain full ownership of your inputs and outputs.
- Your prompts remain yours
- Code and other outputs generated by the Temboo Agent belong to you
- Temboo makes no claim on customer intellectual property
Platform security
Temboo applies established security practices across its infrastructure:
- Encryption in transit
All data in motion is encrypted using TLS.
- Encryption at rest
Data stored by the platform is encrypted using industry-standard encryption (AES).
- Strong data isolation
Customer data is logically isolated by design. Our systems are structured so that there are no code paths that allow access from one customer account to another.
These measures apply to prompt and project data, account data, configuration, and any credentials stored on behalf of customers.
Questions or requirements?
If you have specific security, privacy, or compliance questions, we’re happy to discuss them.
Please
contact us if you need:
- Clarification on data handling
- Zero data retention options
- Information for internal reviews or procurement processes