At Skej, we build AI that users and enterprises can trust. Protecting customer data, maintaining strong security controls, and operating transparently are core to how our platform is designed. This policy explains how Skej’s AI assistant works, what data it accesses, and how that data is protected.
1. What Skej Does
Skej is an AI-powered scheduling assistant that helps users coordinate meetings across email, SMS, Slack, and Microsoft Teams. Skej integrates securely with Google Calendar and Microsoft Outlook to:
Read availability
Suggest meeting times
Schedule and modify meetings
Send calendar invitations
Skej only performs actions directly related to scheduling and tasks you explicitly request.
2. Data Access & Use
a. Calendar & Contacts
Skej connects to Google Calendar and Microsoft Outlook using secure, OAuth-based permissions.
We access only the data required to:
View availability
Create, update, or cancel meetings
Send calendar invites
Store contact-level scheduling preferences
Calendar and contact data is never accessed beyond what is necessary for core scheduling functionality.
b. Message Content
Skej processes only the messages where it is directly included (via email, SMS, Slack, or Microsoft Teams).
This content is used to:
Interpret scheduling requests
Propose and confirm meeting times
Update preferences and contacts
Complete any additional tasks you explicitly assign
Skej does not have access to full inboxes or conversations where it is not included.
c. Data Storage & Retention
All customer data is stored on secure, encrypted AWS infrastructure
Data is encrypted both in transit and at rest
Message content and metadata are retained only as long as necessary to support scheduling workflows (typically up to 30 days)
Data is automatically deleted after the retention period unless required for active workflows or legal obligations
3. AI Models & Providers
Skej uses large language models from trusted providers including OpenAI and Anthropic to interpret natural language and perform scheduling tasks.
Customer data is never used to train AI models
Our agreements with these providers explicitly prohibit training on Skej data
Data is processed solely to deliver requested functionality
4. Security & Compliance
Security is built into every layer of Skej’s platform.
We are SOC 2 Type II compliant and maintain a formal information security program aligned with SOC 2 standards
Continuous monitoring, access controls, incident response procedures, and regular risk assessments are in place
All sub-processors are vetted under security and data protection agreements
Skej also supports regulatory requirements including GDPR and CCPA for user rights, data access, and deletion.
5. Customer Control & Transparency
You remain in control of your data and Skej’s participation:
Skej only acts when included in a conversation
You can remove Skej from any thread at any time
Data access and deletion requests are honored in accordance with applicable laws
For full details on data rights and privacy practices, please review our Privacy Policy.