At Skej, we’re committed to building trustworthy AI that prioritizes user privacy, data security, and transparency. This document outlines how our AI assistant works, what data we access, and how we ensure responsible use of artificial intelligence technologies.
1. What Skej Does
Skej is an AI scheduling assistant that helps users coordinate meetings via email, text, Slack, and Microsoft Teams. Skej integrates with Google Calendar and Microsoft Outlook to read availability, suggest times, and schedule meetings automatically.
2. Data Access & Handling
a. Calendar & Contacts
We access calendar availability and contact information through secure integrations with Google Calendar and Microsoft Outlook. Data from third party calendar integrations are solely used for the purpose of scanning your availability, scheduling meetings, modifying meetings, sending meeting invites to your contacts, and setting your contact meeting preferences.
This access is limited to what’s necessary for scheduling functionality and is granted through OAuth-based permissions.
b. Message Content
Skej processes messages where it is directly addressed or CC’d via email, SMS, Slack, or Teams. We use this content in order to find and present availability, schedule and modify meetings, update preferences, and save contact information. Skej may also use the content to complete any additional tasks and responsibilities you request Skej complete.
We do not have full access to user inboxes. Only the specific messages sent to Skej are processed.
Message content is analyzed to determine appropriate scheduling actions.
c. Data Storage & Retention
All customer data is stored securely on encrypted AWS servers.
Message content and metadata are retained for a maximum of 30 days to support scheduling workflows.
Data is automatically deleted after that retention window.
3. AI Models & Providers
We use large language models provided by OpenAI and Anthropic to power Skej’s natural language understanding.
Customer data is never used to train these models.
Our API agreements with both OpenAI and Anthropic explicitly prohibit training on our data.
4. Security & Compliance
Skej is currently undergoing a SOC 2 Type II audit and implements security controls in line with SOC 2 standards.
We adhere to both GDPR and CCPA requirements regarding user data rights, access, and deletion.
All data is encrypted in transit and at rest.
5. Customer Control & Transparency
Users have full control over when Skej is involved in a conversation.
You can remove Skej from any message thread at any time.
We are happy to honor any requests for data deletion or access, in accordance with applicable privacy laws.
Additional details on the data we collect, how it’s used, shared, and your data rights can be found in our Privacy Policy.