Introduction to Privacy Policy
Asia Innovate Hub (“AIH, ” “we, ” “our, ” or “us”) operates the Amplified Human mobile application (the “App”).
We are committed to protecting your privacy and being transparent about how we collect, use, and share your personal information.
- What information we collect from you
- How we use that information
- When and how we share information
- How we protect your information
- Your rights regarding your information
- How to contact us
By using our App, you agree to the collection and use of information in accordance with this Privacy Policy.
What Information We Collect
When you create an account or contact support, you provide an email address so that OTP can be sent to the mailbox to get access to the platform.
We automatically capture an app-generated user ID, device details (IP address, OS version, browser type), and optional crash logs or performance metrics. These diagnostics help us keep the service stable and secure.
Telemetry tools (Azure Monitor, Sentry) record feature interactions, pages visited, and session length so we can understand how the product is used and improve it.
Everything you upload or create—personal profile details, assessment responses, project boards, dashboards, AI conversations, documents, images, and other files—remains yours. We treat it as confidential workspace data. These data are collected as you use the platform with your permission.
First-party cookies remember your preferences and keep you signed in. We do not track you across
other companiesʼ apps or sites.
We do NOT collect:
- Precise location data (unless explicitly requested for a specific feature)
- Health or medical information
- Sensitive personal information (race, religion, sexual orientation, etc.)
- Camera or microphone data (unless you explicitly use these features)
- SMS or call log dataCalendar or contact information
How We Use Collected Information
We utilize your information to operate, maintain, and deliver the full functionality of our services. By processing your information in these ways, we ensure that you have a seamless and effective experience when using our platform.
We utilize your information to operate, maintain, and deliver the full functionality of our services. This includes:
- Team Collaboration: Facilitating collaboration among users by allowing you to create, share, and work together on content within teams or groups.
- Community Building: Enabling interactions within our user community, such as forums, discussions, and networking opportunities.
- AI Interactions: Processing your inputs to provide personalized responses and insights through our AI models. By interacting with the AI, it helps generating more relevant suggestions to users' needs.
- Data Processing: Handling the data you upload or generate to ensure it is stored securely and processed efficiently for optimal service delivery.
How We Improve Services
We analyze the information collected to enhance the performance and quality of our services. This involves:
- Performance Analysis: Monitoring system performance to identify and resolve issues promptly.
- Feature Development: Using usage data and feedback to develop new features and improve existing ones.
- User Experience Enhancement: Studying interaction patterns to make the platform more intuitive and user-friendly.
- Personalization: Tailoring content and recommendations to suit your preferences and needs.
How We Improve Communications
Your contact information is used to communicate with you effectively, including:
- Notifications: Sending service-related notifications such as confirmations, updates, security alerts, and administrative messages.
- Updates: Informing you about new features, services, or changes to our policies.
- Customer Support: Responding to your inquiries, requests, or feedback to provide assistance and resolve issues.
We ensure that our communications are relevant and respectful of your preferences, providing options to customize or opt out of certain types of messages.
How We Improve Security
We process your information to monitor, maintain, and enhance the security and integrity of our platform:
- Threat Detection: Identifying and protecting against security risks, fraudulent activities, and malicious behavior.
- Access Control: Verifying user identities and managing access permissions to protect your data.
- Incident Response: Investigating and addressing any security breaches or incidents.
- Policy Enforcement: Ensuring compliance with our terms of service and preventing misuse of our platform.
By prioritizing security, we strive to safeguard your information and provide a trusted environment for all users.
How We Improve Compliance
We use your information as necessary to comply with legal obligations and enforce our terms:
- Legal Requirements: Processing data to meet applicable laws, regulations, and legal processes.
- Law Enforcement Requests: Responding to lawful requests and orders from government authorities.
- Dispute Resolution: Using information to resolve disputes, collect fees, or provide assistance with legal matters.
- Policy Enforcement: Enforcing our agreements, policies, and terms of service to maintain a fair and safe platform.
Important Note on AI Training
We do NOT use your personal data or conversations to train our AI models or share this data with third-party AI service providers (OpenAI, Google Gemini API, etc.) for training purposes.
How We Disclose Information We Collect
Collaboration Features: When you create or share content on our platform, it may include personal information about you and your organization (username, email, organization name, organization type…). Based on the settings you choose, you can grant permissions to other users to view, disclose, edit, copy, or download that content. This enables collaboration but also means that certain information about you may be accessible to others within the scope of the permissions granted.
Compliance with Laws: We may disclose your information if required by law, regulation, legal process, or governmental request. This includes responding to lawful requests by public authorities for purposes such as national security or law enforcement.
Authorized Sharing: We will share your personal information with third parties when we have your explicit consent to do so.
This includes situations where you authorize us to share your information with other services or platforms.
We share limited information with trusted service providers who help us operate the App:
Cloud Infrastructure:
- Microsoft Azure (data hosting and storage)
- Azure PostgreSQL (database services)
- Azure Kubernetes Service (application hosting)
Analytics and Monitoring:
- Microsoft Clarity (user behavior analytics – data is masked/anonymized)
- Google Analytics (usage statistics – data is masked/anonymized)
- Azure Monitor (performance monitoring)
- Sentry (error tracking and crash reporting)
How We Store and Secure Information We Collect
We take the security of your personal information very seriously and employ a multi-layered approach to protect it. Below is a
detailed overview of how we store and secure the information we collect, ensuring that you can use our services with confidence.
Secure Data Storage with Azure PostgreSQL
Your data is securely stored using Azure PostgreSQL Flexible Server, which offers robust features to ensure data integrity and availability.
- High Availability and Redundancy: The server is configured with zone-redundant architectures, meaning your data is replicated across multiple physical locations within the same region. This setup ensures continuous access to your data even in the event of hardware failures or data center outages.
- Automatic Backups: We implement regular, automated backups of your data. These backups are encrypted and securely stored, enabling quick restoration in case of data loss. Backup retention policies are in place to meet both operational needs and compliance requirements.
- Scalable Infrastructure: The flexible server allows seamless scaling of compute and storage resources. This means we can adjust to varying workloads without compromising on performance or security, ensuring efficient and secure data handling.
Azure Kubernetes Service (AKS)
We manage our containerized applications through Azure Kubernetes Service, adhering to secure deployment practices:
- Secure Orchestration: AKS automates deployment, scaling, and management, reducing human error and potential vulnerabilities.
- Application Isolation: Each application runs in its own isolated container, minimizing cross-application interference or data leakage.
- Regular Updates and Patching: We maintain up-to-date systems with the latest security patches, protecting against known vulnerabilities and threats.
Encryption Measures
We employ strong encryption protocols to protect your data at all times:
Data at Rest Encryption
All data stored on our servers is encrypted using industry-standard algorithms like AES256. This ensures that your data remains unreadable and secure even if unauthorized access occurs.
Data in Transit Encryption
We use Transport Layer Security (TLS) protocols to encrypt data transmitted between your device and our servers. This protects your information from interception or tampering during transmission over networks.
Access Controls
Strict access controls are enforced to safeguard your information:
- Role-Based Access Control (RBAC): Access to systems and data is granted based on individual roles and responsibilities, following the principle of least privilege. This means users have only the access necessary to perform their duties.
- Multi-Factor Authentication (MFA): We require MFA for access to sensitive systems, adding an extra layer of security beyond just usernames and passwords.
- Regular Audits: Access rights are reviewed periodically to ensure that only authorized personnel have access to critical systems and data.
Secure Your Data with Azure Key Vault
At Amplified Human, we understand the importance of securing sensitive information. We leverage Azure Key Vault to ensure your cryptographic keys, passwords, and certificates are stored securely, protected by hardware security modules (HSMs).
- Secure Storage of Secrets: Cryptographic keys, passwords, certificates, and other secrets are stored securely in Azure Key Vault, protected by hardware security modules HSMs.
- Controlled Access: Strict access policies ensure that only authorized applications and personnel can access the secrets, with all access being logged and monitored.
- Automated Secret Management: We use automated processes for secret rotation and expiration, reducing the risk of compromised credentials.
Network Security
Our network infrastructure is designed to prevent unauthorized access:
- Private Endpoints: We utilize private endpoints to ensure that communication between services (like AKS and Azure PostgreSQL) occurs over a private network within Azure, not exposed to the public internet.
- Network Security Groups (NSGs): NSGs are configured with strict security rules to control inbound and outbound traffic, allowing only necessary communication to and from our services.
- Advanced Firewall Protection: Firewalls provide an additional layer of defense against network-based attacks, monitoring and controlling incoming and outgoing network traffic based on predetermined security rules.
Monitoring and Incident Response
- Azure Monitor and Sentry: These tools provide real-time monitoring and analytics of system performance and security events. They help us detect anomalies and potential threats quickly.
- Real-Time Alerts: Customized alerts notify our security team of critical events, such as unauthorized access attempts or unusual activity patterns
- Audit Logging: All actions and access within our systems are logged. Regular audits help us ensure compliance with security policies and allow us to investigate any suspicious activities.
- Incident Response Plan: We have a comprehensive incident response plan to address and mitigate any security incidents swiftly, minimizing potential impacts on your data.
User Data in AI Systems
We handle your interaction data with our AI models securely:
- Secure Storage and Processing: Interaction data is stored with the same high level of security as other personal data, using encryption and strict access controls.
- Purpose Limitation: Your data is used solely to improve the quality and performance of our AI services. We do not use this data for any other purposes without your explicit consent.
- Anonymization: Where possible, we anonymize or pseudonymize interaction data to protect your identity while still allowing us to enhance our services.
MultiAgent Architecture
Our AI system is designed with privacy and security in mind:
- Data Isolation: Each AI agent specializes in a specific domain and processes data within its own isolated environment. This reduces the risk of data leakage between agents and ensures that your information is handled appropriately.
- Controlled Workflows: Strict protocols govern data processing workflows, ensuring that each agent only accesses the data necessary for its function.
Local Model Deployment
For clients requiring enhanced privacy, we offer the option to deploy AI models locally:
- On-Premises Deployment: AI models can be deployed within your own infrastructure, ensuring that all data processing occurs on your premises.
- Data Sovereignty Compliance: Local deployment helps you comply with data sovereignty laws and regulations by keeping data within specific geographic boundaries.
- Security Support: We provide guidance to ensure that local deployments are secure and adhere to best practices.
Usage of Analytics Tools
We use analytics tools to enhance our services while respecting your privacy:
- Microsoft Clarity and Google Analytics: These tools help us understand user behavior and platform usage, allowing us to improve functionality and user experience.
- Data Masking: We are committed to protecting your personal information. Any input data collected through these tools is masked or anonymized, ensuring that the actual content of your inputs is not stored or accessible.
- Purpose of Data Collection: The information collected is used to personalize your experience, optimize our services, and develop new features that better meet your needs
How Long We Keep Information
At Amplified Human, we understand the importance of data privacy and security. This section outlines our data retention practices, explaining how long we keep your personal information and the reasons behind it.
- Retention Periods: We retain your personal information only as long as necessary to fulfill the purposes outlined in our privacy policy.
- Legal Obligations: Information may be kept longer if required by law or for legitimate business interests.
- Deletion: Upon request or when information is no longer needed, we will securely delete or anonymize your data.
How to Access and Control Your Information
Kept for the duration of your account’s active status.
Automatically deleted within 30 days of account deletion request.
Encrypted backups retained for 90 days for disaster recovery.
Automatically purged after retention period expires.
Data may be retained longer if required by legal obligations.
Specific retention periods vary by jurisdiction and legal requirements.
Anonymized usage statistics retained for up to 2 years.
Used solely for service improvement and research purposes.
Your Rights and Choices
- Request a copy of all personal data we hold about you
- Receive data in a structured, machine-readable format (data portability)
Timeline: We respond to requests within 30 days
- Update or correct inaccurate personal information
- Modify your profile and account settings
Available through in-app settings or by contacting support
- Delete your account and associated personal data
- Request removal of specific information
Account Deletion Process:
- Go to App Settings > Account > Delete Account
- Or email us at jasmine@asiainnovatehub.com with your deletion request
- We will confirm deletion within 7 business days
- All data permanently deleted within 30 days
Children's Privacy
Our App is not intended for children under 13 years of age.
We do not knowingly collect personal information from children under 13. If we discover that we have collected information from a child under 13, we will delete that information immediately.
If you are a parent or guardian and believe your child has provided us with personal information, please contact us immediately.
International Data Transfers
All your personal data is stored and processed in Singapore through Microsoft Azure’s Singapore data centers. We do not transfer your personal information outside of Singapore, ensuring your data remains within Singapore’s jurisdiction and is subject to Singapore’s data protection laws.
Data Center Location:
- Primary: Microsoft Azure Singapore Southeast region
- All databases and storage systems are located in Singapore
- No international data transfers occur during normal operations
Changes to This Policy
We may update this Privacy Policy from time to time to reflect changes in our practices or legal requirements.
We encourage you to review this Privacy Policy periodically to stay informed about how we protect your information.
- We will post the updated policy in the App
- We will notify you via email or in-app notification
- The "Last Updated" date will reflect the revision date
- Continued use of the App after changes constitutes acceptance
Get in Touch
If you have questions, concerns, or requests regarding this Privacy Policy or our data practices, please contact us.
Address
60 PAYA LEBAR ROAD #0754 PAYA LEBAR SQUARE 409051 Singapore SG