Skip to content

Requests & Contact

Available on Request

The following documents are available to prospective and current partners. Contact your AI4Love implementation partner or email support@ai4love.org to request access.

DocumentDescriptionAccess
Data Processing Agreement (DPA)Standard DPA template covering data handling, retention, sub-processors, and breach notification obligations. Customizable per organization.Available to all prospective partners
Sub-Processor ListCurrent list of all third-party providers with roles, data access scope, and compliance certifications.Available to all prospective partners
SOC 2 Type II ReportsReports from infrastructure providers (Airtable, Vercel, Nango, Doppler). AI4Love can facilitate access to provider reports relevant to your compliance review.Available under NDA
Penetration Test ResultsSummary findings from third-party security assessments.Available under NDA
Vendor Security QuestionnairePre-filled responses to standard vendor assessment frameworks (SIG Lite, CAIQ, HECVAT).Available to all prospective partners

What Is Never Gated

The following information is always publicly available in this Trust Center:

  • System architecture and data flow
  • Data handling principles and Zero-Custody model
  • AI behavior model and decision boundaries
  • Security controls and access model
  • Failure modes and incident response procedures
  • Changelog of system updates

We believe transparency about how the system works builds more trust than NDAs around how it doesn't.


Compliance Frameworks

AI4Love's architecture is designed to support compliance with:

  • PIPEDA (Personal Information Protection and Electronic Documents Act)
  • Provincial health privacy legislation (e.g., BC PIPA, Ontario PHIPA) — with appropriate data residency configuration
  • CRA requirements for charitable organizations
  • CASL (Canadian Anti-Spam Legislation) — AI4Love does not send communications, but insight data can inform CASL-compliant outreach by your team

AI4Love does not currently hold its own SOC 2 Type II certification. All data storage and processing is delegated to SOC 2 Type II certified providers (see Infrastructure Dependencies).


Contact

For urgent security matters, include "URGENT" in the subject line. We commit to acknowledging security reports within 24 hours.

AI4Love Trust Center