Privacy Policy

Privacy Policy

  1. Introduction

Your privacy and data security are our top priorities. We understand that the data such as documents you upload to our system are sensitive, and we want to be transparent about how we protect them. This Privacy Policy explains how we collect, use, and safeguard your data when you visit our website or use our services.


  1. Information We Collect

We may collect the following types of information:

Personal Information: Name, email address, payment details, and any other information you provide.

Usage Data: IP address, browser type, device information, and interactions with our website.

User uploaded data: prompts, files inputted into our product


  1. How We Use Your Information

We utilize Google Gemini API to provide AI features within our application. Crucially, because we are a paying customer of the Gemini API, Google does not use your data to train their AI models. According to the Gemini API Additional Terms of Service, for paid services, Google "doesn't use your prompts (including...files such as images, videos, or documents) or responses to improve our products." This ensures that your proprietary information remains your own and is not incorporated into Google's general AI models.


  1. Data Sharing and Disclosure

We never share your data without your explicit consent. We do not sell or rent your data. However, we may share information with:

Service providers assisting us in operating our business.

Legal authorities if required by law.

In the case of business transfers, such as a merger or acquisition.


  1. Data Security

We implement best practice security measures to protect your data from unauthorized access, alteration, or disclosure.

Our application is built on Google Cloud, a platform with enterprise-grade security infrastructure, and is ISO 27001 and SOC 2 certified. We ensure that your information is protected by the same systems Google uses for its own services. You can learn more about Google's commitment to data privacy and security in the Google Cloud Privacy Resource Center and the Google Cloud Platform Privacy Notice.

All your documents are stored in Google Cloud Storage, which uses industry-standard encryption (SSL/TLS) to protect your data both at rest and in transit. This means your information is scrambled and unreadable to unauthorized parties.

We employ strict access controls to ensure that only authorized personnel can access your data for the purpose of maintaining and improving our service.


  1. Your Rights

Depending on your location, you may have the right to:

Access, correct, or delete your personal data.

Object to processing or request data portability.

Withdraw consent where applicable.


  1. Changes to this policy

We may update this Privacy Policy from time to time. The latest version will be posted on our website with an updated effective date.


  1. Contact Us

If you have any questions, please contact us at info@questtor.com

Frequently Asked Questions

How does Questtor prevent hallucinations?

Icon

Questtor uses advanced techniques like Retrieval-Augmented Generation (RAG) which grounds the product's results in verified information from our proprietary database. We also use other techniques such as, but not limited to: reverse prompting, chain of thought prompting, and re-inforcement learning.

What kind of gaps can Questtor detect?

Icon

How does Questtor ensure that every gap is detected?

Icon

How does Questtor understand my company's specific procedures and policies?

Icon

What happens to the data that I upload?

Icon

How does Questtor keep my data safe and secure?

Icon

How does Questtor prevent hallucinations?

Icon

Questtor uses advanced techniques like Retrieval-Augmented Generation (RAG) which grounds the product's results in verified information from our proprietary database. We also use other techniques such as, but not limited to: reverse prompting, chain of thought prompting, and re-inforcement learning.

What kind of gaps can Questtor detect?

Icon

How does Questtor ensure that every gap is detected?

Icon

How does Questtor understand my company's specific procedures and policies?

Icon

What happens to the data that I upload?

Icon

How does Questtor keep my data safe and secure?

Icon

No setup, no migration

Just 3 clicks to see results

No setup, no migration

Just 3 clicks to see results

No setup, no migration

Just 3 clicks to see results

Frequently Asked Questions

How does Questtor prevent hallucinations?

Icon

Questtor uses advanced techniques like Retrieval-Augmented Generation (RAG) which grounds the product's results in verified information from our proprietary database. We also use other techniques such as, but not limited to: reverse prompting, chain of thought prompting, and re-inforcement learning.

What kind of gaps can Questtor detect?

Icon

How does Questtor ensure that every gap is detected?

Icon

How does Questtor understand my company's specific procedures and policies?

Icon

What happens to the data that I upload?

Icon

How does Questtor keep my data safe and secure?

Icon

How does Questtor prevent hallucinations?

Icon

Questtor uses advanced techniques like Retrieval-Augmented Generation (RAG) which grounds the product's results in verified information from our proprietary database. We also use other techniques such as, but not limited to: reverse prompting, chain of thought prompting, and re-inforcement learning.

What kind of gaps can Questtor detect?

Icon

How does Questtor ensure that every gap is detected?

Icon

How does Questtor understand my company's specific procedures and policies?

Icon

What happens to the data that I upload?

Icon

How does Questtor keep my data safe and secure?

Icon