RevBooker, a service of Revica.io, LLC Effective date: 14th October, 2024
RevBooker, a service of Revica.io, LLC (“RevBooker,” “we,” “us,” or “our”) is committed to protecting the privacy of our users (“user,” “you,” or “your”). This Privacy Policy describes how we collect, use, store, and disclose information about users of our AI receptionist service, website (www.revbooker.com), and related services (collectively, the “Service”).
As an AI-powered communication service, we understand the sensitive nature of business communications and the trust you place in us to handle your data responsibly. This privacy policy is designed to provide you with clear, detailed information about our data practices and your rights regarding your information.
To help you better understand our privacy practices, we’ve defined several important terms used throughout this policy:
When you use our Service, you actively provide us with several types of information:
Account Information: During registration and account setup, you provide basic business and contact information, including your name, email address, phone number, and business details. This information is essential for creating and managing your account and providing our core services.
Payment Information: To process payments for our Service, you provide payment details such as credit card information or banking details. We handle this sensitive information in accordance with PCI DSS requirements and never store complete payment card numbers on our servers.
Business Operations Details: You share information about your business hours, operational procedures, and service preferences to customize your AI receptionist. This may include specific instructions for call handling, business rules, and customer service protocols that help our AI system accurately represent your business.
Voice Customization Data: If you choose to customize your AI receptionist’s voice or responses, you may provide voice samples or specific phraseology preferences. This information helps us tailor the AI’s communication style to match your business’s tone and brand.
Contact and Customer Information: You may upload or provide contact lists, customer preferences, and other business-related data that helps our AI system better serve your customers. This information is treated with strict confidentiality and used only for providing our Service.
Through your use of our Service, we automatically collect:
Call-Related Data: Our system automatically records and processes all calls handled by the AI receptionist. This includes:
Service Performance Data: We collect detailed metrics about how our Service performs, including:
Technical Environment Information: To ensure optimal service delivery, we gather:
We receive additional information about you from various third-party sources:
Payment and Financial Services: Our payment processors provide us with transaction statuses, payment verifications, and fraud prevention alerts. This information helps us maintain secure and reliable payment processing.
Integration Partners: When you use our Service with other business tools, we receive relevant integration data such as calendar availability, CRM updates, or communication preferences through our API connections.
Business Verification Services: To maintain service integrity, we may receive business verification data from identity verification services, credit reporting agencies, or business information providers.
Public Sources: We may collect publicly available information about your business from government databases, professional directories, or other public records to enhance our service accuracy.
Our primary use of your information centers on delivering and maintaining our AI receptionist service effectively:
Service Delivery: We process your call data and business information in real-time to provide accurate and efficient call handling. This includes analyzing incoming calls, determining appropriate responses, and managing call routing based on your specified preferences and business rules. Our AI system uses your configured parameters to make informed decisions about how to handle each interaction.
Account Management: We utilize your account information to maintain and optimize your service configuration, process your subscription payments, and ensure your access to all appropriate features and functions. This includes monitoring your service usage, managing your subscription status, and maintaining accurate billing records.
Quality Assurance: To maintain high service standards, we continuously monitor call quality, AI performance, and system reliability. This involves analyzing call patterns, reviewing AI decision accuracy, and identifying areas for improvement in our service delivery. We use this information to make real-time adjustments to enhance call handling quality.
Technical Support: When you contact our support team, we use your account information and service history to provide efficient, contextualized assistance. This includes reviewing recent call logs, system configurations, and any reported issues to quickly resolve technical problems or address service concerns.
The continuous improvement of our AI system is crucial for providing superior service:
Model Training: We carefully process and anonymize selected call data to train our AI models, improving their ability to understand different accents, speaking patterns, and business contexts. This training process removes all personally identifiable information while preserving the linguistic and contextual patterns that help our AI system better serve all users.
Speech Recognition Enhancement: Through analysis of voice interactions, we improve our system’s ability to accurately understand various speech patterns, accents, and industry-specific terminology. This process involves studying phonetic patterns and language usage while maintaining strict privacy controls.
Natural Language Processing: We analyze conversation flows and response patterns to enhance our AI’s ability to engage in natural, context-appropriate dialogue. This includes studying successful call resolutions, identifying common customer inquiries, and optimizing response strategies.
Performance Optimization: By examining system performance metrics, we continuously refine our AI’s decision-making capabilities, response time, and accuracy. This involves analyzing call handling patterns, studying error cases, and implementing improvements to prevent similar issues in the future.
We process service data to provide valuable insights and improve user experience:
Usage Analysis: We conduct detailed analysis of service usage patterns to understand how businesses utilize our features and identify opportunities for service enhancement. This includes studying peak usage times, popular features, and common use cases to optimize service delivery.
Performance Reporting: We generate comprehensive reports on service performance, including call handling statistics, response accuracy rates, and system reliability metrics. These reports help us maintain service quality and provide you with insights into your business’s communication patterns.
Business Insights: Through analysis of aggregated call data and service usage patterns, we identify trends and patterns that can help improve business operations. This may include peak call times, common customer inquiries, and service efficiency metrics, all provided in an anonymized format.
We implement rigorous controls over how AI training data is processed and used:
Anonymization Protocol: Our sophisticated anonymization process removes or obscures all personally identifiable information from call data before it enters our AI training pipeline. This includes:
Voice Pattern Protection: We employ advanced voice processing techniques to protect individual privacy while maintaining the acoustic patterns necessary for improving our speech recognition:
Data Retention Controls: We maintain clear policies regarding the retention and use of AI training data:
We implement comprehensive security measures for our AI systems:
Model Architecture Security: Our AI models are designed with privacy-preserving architectures that:
Training Data Protection: We employ multiple layers of protection for training data:
Inference Privacy: During real-time operation, our AI system:
We carefully select and monitor third-party service providers who assist in delivering our service:
Infrastructure Providers: Our cloud infrastructure providers maintain the highest levels of security certification and compliance. They provide:
Payment Processors: We work with PCI-DSS compliant payment processors who:
We implement a comprehensive, defense-in-depth approach to security:
Infrastructure Security: Our enterprise-grade security infrastructure provides multiple layers of protection for your data:
Access Security: We maintain strict access controls through:
Our security program encompasses both technical and human elements:
Security Programs: We maintain comprehensive security programs including:
Personnel Security: Our staff undergoes rigorous security screening:
We provide comprehensive data access and control capabilities:
Data Access: Users have the right to access their information through:
Data Control: Users maintain control over their information through:
We provide detailed control over all communications:
Marketing Communications: Users can manage marketing preferences through:
Service Communications: Essential service messages are managed through:
Our infrastructure is designed for security and privacy:
Security Components: The system architecture includes:
Privacy Controls: We implement privacy by design through:
Our integration framework ensures secure third-party connections:
API Security: All integrations are secured through:
Partner Requirements: We mandate security standards for partners:
We implement enhanced protections for sensitive information:
Special Categories: Enhanced protection for:
Protected Classes: Additional safeguards for information relating to:
We provide enhanced protections for vulnerable users:
Protected Groups: Special handling for:
We maintain comprehensive incident response procedures:
Detection and Response: Our security incident management program includes:
Notification Framework: Our incident communication plan encompasses:
We handle privacy incidents with particular care:
Assessment and Response: Our privacy incident handling includes:
Notification Procedures: We maintain clear communication protocols:
We maintain comprehensive business continuity measures:
Disaster Recovery: Our disaster recovery program includes:
Continuity Testing: We regularly verify our continuity capabilities through:
Our comprehensive compliance program addresses multiple regulatory requirements:
Global Compliance: We maintain compliance with:
Industry Standards: We adhere to:
We actively monitor and maintain compliance through:
Internal Controls: Our compliance monitoring includes:
External Validation: We undergo regular external verification:
We maintain strict controls over international data movement:
Transfer Mechanisms: Our international data transfers are governed by:
Regional Requirements: We address specific regional requirements through:
Our legal framework is based in Texas law while respecting international requirements:
Legal Basis: This Policy is governed by:
We provide clear dispute resolution procedures:
Resolution Process: Disputes are handled through:
We maintain and update this policy through:
Change Management: Our policy maintenance includes:
This Privacy Policy was last updated on November 18, 2024.