Relativ.ai Trust Center
At Relativ, security is foundational to our mission of creating psychologically safe practice and feedback spaces that enhance human performance. Trust is essential for meaningful learning, growth, and reflection, and our security-first approach ensures that trust is never compromised. We treat all data entrusted to us with care, discretion, and responsibility. By embedding security into everything we build, we empower individuals and organizations to practice, receive feedback, and improve with confidence — knowing their experiences are protected.
Compliance
Resources
Information Security Policy
Change Management Policy
Risk and Governance Executive Committee Charter
Network Security Policy
Acceptable Use Policy
Controls
Remote access tool
ePHI policy accessibility evidence
Access restricted to modify infrastructure
Source code access restricted and changes logged
Access control procedures
Data encrypted at rest
Secure disposal of electronic media containing sensitive data (PII, ePHI, etc.)
Customer data deleted after termination
ePHI data sanitization
Database backups performed
Secure connection means utilized
External Attack Surface Vulnerability Scanning & Remediation
Web application firewalls configuration
Source code changes tested and approved
Outsourced development security requirements managed
SSL/TLS certificates for infrastructure
Anti-malware monitoring
Intrusion detection tool
Automated system capacity and performance monitoring
Monitoring tool
Business continuity & disaster recovery plans documented and tested
Security incident logging and review
Breach notification communication
Incident response and breach notification policy
Visitor sign-in, badging, and escort policy
Technology assets inventoried
Documented Vendor Management Program
Annual risk assessments performed
Vendor termination
Vendor list
Vendor onboarding
Media disposal training
Confidentiality Agreement acknowledged by employees
List of newly hired employees & contractors
Employee handbook
List of active employees & contractors as on date
Asset register maintaining
Whisteblower mechanism maintained
Multi-availability zones
Documentation available to internal and external users
Customer support channels available
Risk and Governance Executive Committee meeting minutes
Risk management program
Key management services used
Mobile device management tool configurations
Ticketing tool
Security-related roles
Internal communication for changes in roles
Subprocessors
OpenAIAI & ML Services