Skip to main content

Skej AI Usage & Data Policy

Our commitment to privacy, security, and responsible AI

Updated over a month ago

At Skej, we build AI that users and enterprises can trust. Protecting customer data, maintaining strong security controls, and operating transparently are core to how our platform is designed. This policy explains how Skej’s AI assistant works, what data it accesses, and how that data is protected.


1. What Skej Does

Skej is an AI-powered scheduling assistant that helps users coordinate meetings across email, SMS, Slack, and Microsoft Teams. Skej integrates securely with Google Calendar and Microsoft Outlook to:

  • Read availability

  • Suggest meeting times

  • Schedule and modify meetings

  • Send calendar invitations

Skej only performs actions directly related to scheduling and tasks you explicitly request.


2. Data Access & Use

a. Calendar & Contacts

Skej connects to Google Calendar and Microsoft Outlook using secure, OAuth-based permissions.

We access only the data required to:

  • View availability

  • Create, update, or cancel meetings

  • Send calendar invites

  • Store contact-level scheduling preferences

Calendar and contact data is never accessed beyond what is necessary for core scheduling functionality.


b. Message Content

Skej processes only the messages where it is directly included (via email, SMS, Slack, or Microsoft Teams).

This content is used to:

  • Interpret scheduling requests

  • Propose and confirm meeting times

  • Update preferences and contacts

  • Complete any additional tasks you explicitly assign

Skej does not have access to full inboxes or conversations where it is not included.


c. Data Storage & Retention

  • All customer data is stored on secure, encrypted AWS infrastructure

  • Data is encrypted both in transit and at rest

  • Message content and metadata are retained only as long as necessary to support scheduling workflows (typically up to 30 days)

  • Data is automatically deleted after the retention period unless required for active workflows or legal obligations


3. AI Models & Providers

Skej uses large language models from trusted providers including OpenAI and Anthropic to interpret natural language and perform scheduling tasks.

  • Customer data is never used to train AI models

  • Our agreements with these providers explicitly prohibit training on Skej data

  • Data is processed solely to deliver requested functionality


4. Security & Compliance

Security is built into every layer of Skej’s platform.

  • We are SOC 2 Type II compliant and maintain a formal information security program aligned with SOC 2 standards

  • Continuous monitoring, access controls, incident response procedures, and regular risk assessments are in place

  • All sub-processors are vetted under security and data protection agreements

Skej also supports regulatory requirements including GDPR and CCPA for user rights, data access, and deletion.


5. Customer Control & Transparency

You remain in control of your data and Skej’s participation:

  • Skej only acts when included in a conversation

  • You can remove Skej from any thread at any time

  • Data access and deletion requests are honored in accordance with applicable laws

For full details on data rights and privacy practices, please review our Privacy Policy.

Did this answer your question?