Last Updated: January 18, 2025

Privacy Policy

Aryacognis Pvt Ltd (trading as "Youkti")

Effective Date: January 18, 2025

1. Introduction

Aryacognis Pvt Ltd, trading as Youkti ("Company," "we," "our," or "us"), respects your privacy and is committed to protecting your personal information. This Privacy Policy ("Policy") explains how we collect, use, share, and protect personal information when you:

  • • Visit our website at www.youkti.ai (the "Site")
  • • Use our mobile applications (the "App")
  • • Use our sales intelligence platform and related services (collectively, the "Services")

By using the Services, you agree to this Privacy Policy. If you do not agree, please discontinue use of the Services immediately.

This Privacy Policy is incorporated by reference into our Terms and Conditions and Data Processing Addendum (DPA).

1.1 Key Points:

  • We are a B2B (business-to-business) platform designed for sales teams and professionals
  • We use artificial intelligence to power email generation, insights, and analysis
  • We process data on behalf of enterprise customers as a data processor under GDPR
  • We protect your data with industry-leading security measures including encryption and access controls
  • You have robust rights to access, correct, delete, and control your personal information

2. Information We Collect

We collect information to provide, improve, and personalize our Services. We collect information in the following ways:

2.1 Information You Provide Directly

2.1.1 Account Information:

When you create an account or register for our Services, we collect:

  • • Full name
  • • Email address
  • • Phone number (optional)
  • • Company name and job title
  • • Profile photo (optional)
  • • Password (stored encrypted)

2.1.2 Payment Information:

We use Razorpay (razorpay.com) as our payment processor. When you purchase our services:

  • • Razorpay collects and processes your payment card details, UPI information, billing address, and transaction information
  • • We do NOT store your credit card numbers or payment details - all payment data is stored securely by Razorpay
  • • Razorpay is PCI-DSS compliant and follows industry security standards
  • • We receive only: transaction ID, last 4 digits of card (if applicable), payment method, payment status, and billing email

For questions about payment security, contact: billing@youkti.ai

2.1.3 Organization Information (Enterprise Customers):

If you create an account on behalf of an organization, we may collect:

  • • Organization name, address, and industry
  • • Billing contact information
  • • Tax identification numbers (for invoicing)
  • • Number of employees/seats

2.1.4 Content and Communications:

Customer Data: Information you upload, import, or input into the Platform, including:

  • • CRM data (prospect names, companies, contact details)
  • • Email content (sent, received, drafts)
  • • Meeting notes and transcripts
  • • Calendar events
  • • Sales activity and pipeline data

Communications with Us: When you contact customer support via Freshchat, email, or other channels, provide feedback, respond to surveys, or communicate with us, we collect the content of those communications

AI Prompts and Inputs: When you use AI features, we collect your prompts, queries, instructions, and the data you provide for analysis

2.2 Information We Collect Automatically

When you use our Services, we automatically collect:

2.2.1 Usage Information:

  • • Device information (type, operating system, browser type and version)
  • • IP address and approximate geographic location (city/country level)
  • • Pages visited, features used, and time spent
  • • Clickstream data and navigation paths
  • • Search queries within the Platform
  • • Date and time of access
  • • Referring website or source

2.2.2 Performance and Diagnostic Data:

  • • Application logs and error reports (via Datadog)
  • • System performance metrics and monitoring data
  • • Feature usage analytics
  • • Crash reports and debugging information

2.2.3 Cookies and Similar Technologies:

We use cookies, web beacons, pixels, and similar tracking technologies. See Section 5 for details.

2.2.4 Behavioral Pattern Data:

As you use the Platform, we automatically generate and store behavioral pattern data to improve the quality and relevance of our AI-powered features. This includes:

  • • Sales workflow patterns (e.g., typical sequences of actions you take during prospecting)
  • • Interaction success rates (e.g., which types of outreach generate responses)
  • • Relationship maps between accounts, contacts, and sales activities within your organization's workspace
  • • Historical patterns used to inform AI recommendations and predictions

This data is stored in a specialized graph database that maps relationships and patterns across your sales activities. Behavioral pattern data is tenant-isolated — your organization's patterns are never combined with or visible to other organizations.

2.2.5 Semantic Search Data:

To power contextual AI features, we generate mathematical representations (embeddings) of your sales activities, conversation history, and account data. These embeddings are stored in a specialized search database that enables ARYA to quickly retrieve relevant context when responding to your queries. Embeddings are derived from your data but cannot be reverse-engineered into the original text. They are tenant-isolated and encrypted at rest.

2.2.6 AI Agent Session Identifiers:

When you interact with ARYA, our system generates a unique session identifier (agent instance ID) to track the AI agent's context, actions, and audit trail for that interaction. This identifier is linked to your user account and is used to maintain conversation continuity, enable audit logging, and ensure security. Agent session identifiers are retained for 90 days as part of our usage logs and are not used for cross-session behavioral tracking or advertising.

2.3 Information from Third-Party Sources

2.3.1 Licensed Data Providers:

  • Full Enrich (fullenrich.com): Prospecting data, email verification, contact enrichment
  • Company Enrich (companyenrich.com): Company and contact data enrichment, firmographic information
  • Apollo.io (apollo.io): Contact discovery, professional email lookup, prospecting data
  • ZoomInfo (zoominfo.com): B2B contact data, company intelligence, organizational charts
  • Crunchbase (crunchbase.com): Company funding data, leadership information, firmographic intelligence

2.3.2 Automated Collection from Public Sources (Web Monitoring):

Our Competitive Intelligence features use automated web monitoring and data collection technologies to gather publicly available business information. This includes:

  • What we collect: Company news, press releases, product announcements, pricing changes, job postings, leadership changes, and other publicly available business information from company websites, news sites, and public business directories
  • How we collect it: We use automated web monitoring tools that periodically check publicly accessible web pages for changes and new information relevant to your tracked accounts and competitors
  • Personal data: Where publicly available business information includes personal data of business professionals (e.g., names, job titles, professional email addresses listed on company websites), we process this data under our legitimate interest in providing sales intelligence services (GDPR Art. 6(1)(f))
  • What we do NOT collect: We do not scrape private social media profiles, access password-protected content, or circumvent technical access restrictions

Legal basis: Legitimate interests in providing competitive intelligence features to our B2B customers

Rights of data subjects: If you are a business professional whose publicly available information has been collected through our web monitoring, you have the right to access, correct, or request deletion of your data. See Section 10 for instructions.

We comply with applicable laws regarding automated data collection and respect robots.txt directives and website terms of service where technically feasible. Our automated collection practices are designed to minimize the volume of personal data collected and focus on business-relevant intelligence.

2.3.3 Publicly Available Sources:

  • • Company websites and public business directories
  • • LinkedIn public profiles and professional networks
  • • Business registries and government databases
  • • Press releases and news articles

2.3.4 Customer-Connected Integrations:

When you connect third-party services (CRM systems, email platforms, calendar applications), we receive data from those services as authorized by you.

Data We Collect from Third-Party Integrations:

  • CRM data (Salesforce, HubSpot, Pipedrive): Contact records, accounts, opportunities, activities
  • Email platforms (Gmail, Outlook): Email content, metadata, contacts, read receipts
  • Calendar services (Google Calendar, Outlook Calendar): Events, attendees, meeting details
  • Communication tools (Slack, Microsoft Teams): Messages, channel data (if integrated)

2.3.5 Important Notice About Third-Party Data:

When we collect business contact information from public sources or licensed data providers, we do so for legitimate business intelligence purposes. If you are a business professional and your publicly available information appears in our database, you have the right to request access, correction, or removal of your information. See Section 10 for instructions.

2.4 Information We Do NOT Collect

We do NOT collect or process:

  • ❌ Special categories of personal data (racial/ethnic origin, political opinions, religious beliefs, health data)
  • ❌ Sensitive personal information (social security numbers, financial account numbers, precise geolocation)
  • ❌ Information about children under 16 years of age
  • ❌ Consumer personal data for B2C marketing purposes

If you inadvertently upload such data, please notify us immediately at privacy@youkti.com

3. How We Use Your Information

We use the personal information we collect for the following purposes:

3.1 To Provide and Operate the Services

  • • Create and manage your account
  • • Process transactions and send billing invoices
  • • Deliver the core functionality of our sales intelligence platform
  • • Enable AI-powered features (email generation, insights, meeting analysis)
  • • Provide customer support via Freshchat and email
  • • Facilitate integrations with your CRM, email, and calendar systems
  • • Send transactional emails (account notifications, password resets, receipts)

3.2 To Improve and Personalize the Services

  • • Analyze usage patterns to improve product features and user experience
  • • Conduct research, testing, and development of new features
  • • Monitor performance and system health via Datadog
  • • Personalize content and recommendations based on your usage
  • • Conduct surveys and gather feedback (with your consent)

3.3 For Marketing and Communications

  • • Send marketing emails, newsletters, and product announcements (with your consent)
  • • Notify you about new features, updates, or promotions
  • • Invite you to webinars, events, or training sessions
  • • Display relevant advertisements (only on our own platform)

You can opt out of marketing communications at any time by:

  • • Clicking "Unsubscribe" in any marketing email
  • • Adjusting preferences in your account settings
  • • Emailing privacy@youkti.com

Note: You cannot opt out of transactional emails (e.g., password resets, billing notices) as these are necessary for the Services.

3.4 For Security, Compliance, and Legal Purposes

  • • Detect, prevent, and investigate fraud, security incidents, and abuse
  • • Monitor for violations of our Terms of Service and Acceptable Use Policy
  • • Comply with legal obligations (tax laws, data protection regulations, court orders)
  • • Enforce our agreements and protect our legal rights
  • • Respond to lawful requests from government authorities or law enforcement
  • • Conduct anti-spam compliance monitoring

Fraud Detection and Behavioral Monitoring:

We operate a continuous security monitoring system that analyzes usage patterns to detect and prevent fraud, abuse, and unauthorized access. This system:

  • What we monitor: Login patterns, API usage frequency, data access patterns, action sequences, tool execution patterns, and session behavior
  • How we analyze: We use pattern-matching algorithms and anomaly detection models that compare current behavior against your historical baseline and against known fraud patterns
  • Risk scoring: Each session and action receives an automated risk score based on behavioral analysis. Risk scores are used internally only and are not visible to users

Consequences of high risk scores:

  • Low risk: Normal operation, no user impact
  • Medium risk: Additional verification may be triggered (e.g., MFA re-prompt)
  • High risk: Action may be temporarily blocked pending review; your organization's administrator and/or our security team will be notified
  • Critical risk: Session may be terminated; account may be temporarily restricted pending investigation

Your rights: You can contest any security restriction by contacting support@youkti.com. We will provide a human review of any automated security decision upon request.

Data retention: Fraud detection and security monitoring logs are retained for 1 year (see Section 9.1)

Legal basis: Legitimate interests in protecting the security of our platform and our users (GDPR Art. 6(1)(f))

Our security monitoring system performs both pre-execution and post-execution analysis of AI tool interactions. Before ARYA executes a tool action, the system checks for patterns consistent with fraud, policy violations, or anomalous behavior. After execution, results are validated against expected patterns to detect data manipulation or unexpected changes. This dual-layer analysis helps ensure the integrity and security of all AI-powered actions.

3.5 For Business Operations

  • • Manage vendor and subprocessor relationships
  • • Conduct internal audits and quality assurance
  • • Analyze business performance and create anonymized reports
  • • Facilitate corporate transactions (mergers, acquisitions) with notice to you

5. Cookies and Tracking Technologies

5.1 What Are Cookies?

Cookies are small text files stored on your device (computer, smartphone, tablet) when you visit our website. They help us recognize your browser, remember your preferences, and analyze how you use our Services.

5.2 Types of Cookies We Use

Essential Cookies (Always Active)

These cookies are strictly necessary for the website to function and cannot be disabled. They enable core functionality such as:

  • • User authentication and security
  • • Maintaining your session as you navigate the site
  • • Load balancing and performance optimization
  • • Fraud detection and prevention

5.3 Analytics Cookies (Requires Consent)

These cookies help us understand how visitors interact with our website by collecting anonymized information:

  • Google Analytics: Analyze traffic patterns, popular pages, and user journeys
  • IP Anonymization: We enable Google's "anonymizeIP" function
  • Data Retention: Google Analytics data is retained for 14 months and then automatically deleted
  • Opt-Out: Install the Google Analytics Opt-out Browser Add-on

5.4 Performance Cookies (Requires Consent)

These cookies help us monitor and improve website performance:

  • Datadog RUM (Real User Monitoring): Collects performance metrics, page load times, and error tracking to ensure optimal user experience
  • Data collected: Browser type, device type, page load times, JavaScript errors, user interactions (anonymized)

Cookies set:

  • _dd_s: Session cookie used to group user interactions into a session. Expires after 15 minutes of inactivity or 4 hours maximum. Contains a session ID and session state — no personal identifiers.
  • Local storage: Datadog RUM may use browser local storage to buffer performance telemetry before transmission

Opt-out: You can block Datadog RUM cookies through your browser settings or our Cookie Preference Center. This will not affect platform functionality but will prevent us from monitoring performance for your sessions.

5.5 Functional Cookies (Requires Consent)

These cookies enable enhanced functionality and personalization:

  • • Language preferences
  • • Region/timezone settings
  • • UI customization (theme, layout preferences)
  • • Feature toggles and A/B testing

5.6 Managing Your Cookie Preferences

When you first visit our website, you'll see a cookie consent banner allowing you to accept or reject non-essential cookies. You can change your preferences at any time by:

  • • Clicking the "Cookie Settings" link in the footer of our website
  • • Adjusting settings in our Cookie Preference Center
  • • Using your browser settings to block or delete cookies

Important: Blocking essential cookies may prevent you from using certain features of our Services, including account login and core functionality.

6. How We Share Your Information

We share personal information with trusted third parties only as described below. We do NOT sell your personal information to anyone.

6.1 Service Providers and Subprocessors

We engage carefully vetted third-party service providers ("Subprocessors") to help us deliver, secure, and improve our Services. These providers process personal data on our behalf under strict contractual obligations.

Cloud Infrastructure & Hosting

SubprocessorPurposeData LocationWebsite
Amazon Web Services (AWS)Cloud infrastructure, databases, application serversUnited States (us-east-1)aws.amazon.com
Google Cloud Platform (GCP)Backup storage, AI/ML infrastructureUnited States (us-central1)cloud.google.com

Artificial Intelligence & Machine Learning

SubprocessorPurposeData LocationWebsite
AnthropicAI-powered email generation, sales insights via Claude APIUnited Statesanthropic.com
OpenAINatural language processing, email generation via GPT modelsUnited Statesopenai.com
Google GeminiAI email generation, insights, natural language processingUnited Statesgemini.google.com

Important: Your data sent to AI providers is NOT used to train their public AI models. We have contractual agreements with all AI providers prohibiting the use of customer data for model training.

Integration & Workflow Orchestration

SubprocessorPurposeData LocationWebsite
ComposioIntegration orchestration platform managing OAuth authentication, API token storage, and tool execution across 20+ third-party services (CRM, email, calendar, communication tools). Composio securely stores and manages OAuth tokens and API credentials on our behalf to enable seamless integration with your connected services.United Statescomposio.dev

Important: Composio acts as an intermediary for all third-party integrations you connect to Youkti.

When you authorize a connection (e.g., Gmail, HubSpot, Salesforce, Slack), your OAuth tokens and API credentials are securely managed through Composio's infrastructure. Composio processes authentication data only for the purpose of maintaining your authorized integrations and does not use your data for its own purposes.

Sub-Subprocessors: Composio utilizes its own infrastructure providers and subprocessors to deliver its services. A list of Composio's subprocessors is available upon request from privacy@youkti.com. We require Composio to maintain equivalent data protection standards with its own subprocessors and to notify us of changes to its subprocessor list.

Data Enrichment Providers

SubprocessorPurposeData LocationWebsite
Apollo.ioContact discovery and prospecting data enrichmentUnited Statesapollo.io
ZoomInfoB2B intelligence and contact data enrichmentUnited Stateszoominfo.com
CrunchbaseCompany funding and firmographic dataUnited Statescrunchbase.com

Analytics & Monitoring

SubprocessorPurposeData LocationWebsite
DatadogApplication performance monitoring, distributed tracing, error tracking, log aggregationUnited Statesdatadoghq.com
AWS CloudWatchInfrastructure monitoring, log storage, and alertingUnited Statesaws.amazon.com/cloudwatch
New RelicApplication performance monitoring, distributed tracing, error trackingUnited Statesnewrelic.com
Elastic CloudLog aggregation, search, and analysis for operational and security logsUnited Stateselastic.co
AWS X-RayDistributed request tracing and performance analysisUnited Statesaws.amazon.com/xray

Communication & Email Delivery

SubprocessorPurposeData LocationWebsite
MailgunTransactional and marketing email delivery, bounce handlingUnited Statesmailgun.com

Customer Support

SubprocessorPurposeData LocationWebsite
Freshchat (Freshworks)Live chat support, customer service, support ticket managementIndiafreshworks.com

Payment Processing

SubprocessorPurposeData LocationWebsite
RazorpayPayment processing, subscription billing, invoicingIndiarazorpay.com

Note: Youkti does not store payment card data. All payment information is securely processed and stored by Razorpay in compliance with PCI-DSS standards.

Full Subprocessor List

For the most current list of subprocessors, including any recent additions, visit: www.youkti.ai/legal/subprocessors

Changes to Subprocessors: We provide 30 days' advance notice before engaging new subprocessors. Enterprise customers with a Data Processing Addendum (DPA) have the right to object to new subprocessors within 14 days of notice.

Sub-Subprocessors: Where our subprocessors engage their own sub-subprocessors to process Customer Data, we require by contract that (a) the sub-subprocessor is bound by data protection obligations no less protective than those in this Privacy Policy, and (b) our subprocessor remains fully liable for the acts and omissions of its sub-subprocessors. Upon request, we will provide the current list of sub-subprocessors for any of our subprocessors.

6.2 Within Your Organization (Enterprise Customers)

If you use Youkti through an enterprise or organizational account:

  • Account Administrators appointed by your organization can view and manage user accounts, access levels, and certain usage data
  • Admin Panel Access may allow authorized personnel within your organization to view communications, content, and activities of users within your organization
  • Usage Analytics may be shared with your organization's decision-makers to help them understand team performance and product adoption

Important: You should exercise good judgment when sharing information through the Platform. Do not post sensitive, confidential, or private information that you do not want your organization's administrators to access. See Section 15 for more details.

6.3 With Your Consent

With your explicit consent, we may share your information:

  • • At webinars, events, or training sessions with event co-hosts or sponsors
  • • In customer testimonials, case studies, or marketing materials (name, company, photo, quote)
  • • With marketing partners for joint promotional activities

You can withdraw consent at any time by contacting privacy@youkti.com.

6.4 For Legal Reasons

We may disclose your personal information when we believe in good faith that disclosure is necessary to:

  • • Comply with applicable laws, regulations, or legal processes (subpoenas, court orders, government requests)
  • • Enforce our Terms of Service, Acceptable Use Policy, or other agreements
  • • Detect, prevent, or investigate fraud, security incidents, or illegal activities
  • • Protect the rights, property, and safety of Youkti, our users, or the public
  • • Respond to claims of rights violations or defend against legal claims

We will make reasonable efforts to notify you of such legal requests unless prohibited by law or court order.

6.5 Business Transfers

If Youkti is involved in a merger, acquisition, asset sale, bankruptcy, or other corporate transaction, your personal information may be transferred as part of that transaction. We will:

  • • Provide notice to you (via email or prominent notice on our website) before your information is transferred
  • • Ensure the acquiring party agrees to protect your information consistent with this Privacy Policy
  • • Give you the opportunity to delete your account before the transfer, if feasible

6.6 Aggregated and Anonymized Data

We may share aggregated, anonymized, or de-identified data that cannot reasonably be used to identify you:

  • • With business partners for industry research and trend analysis
  • • In public reports, presentations, or marketing materials
  • • With investors and stakeholders for business performance reporting

This data is not considered "personal information" and is not subject to this Privacy Policy.

6.7 What We Do NOT Share

We do NOT:

  • ❌ Sell your personal information to third parties
  • ❌ Share your data with advertisers for targeted advertising (we don't run third-party ads)
  • ❌ Provide your email address to third parties for their marketing purposes (without your consent)
  • ❌ Share raw AI prompts or outputs with third parties (unless you explicitly authorize it)

7. International Data Transfers

7.1 Where Your Data Is Processed

Youkti operates globally, and your personal information may be transferred to, stored in, and processed in countries outside your country of residence, including:

  • United States (primary data centers via AWS and GCP)
  • India (payment processing via Razorpay, customer support via Freshchat)
  • Other countries where our subprocessors operate data centers

These countries may have data protection laws that differ from the laws of your jurisdiction.

7.2 Safeguards for International Transfers

When we transfer personal data from the European Economic Area (EEA), United Kingdom, or Switzerland to countries that do not provide an "adequate" level of data protection under GDPR, we implement appropriate safeguards:

For Transfers to the United States:

  • Standard Contractual Clauses (SCCs): We use the European Commission-approved Standard Contractual Clauses (Module Two: Controller to Processor) with our US-based subprocessors
  • Supplementary Measures: We implement additional technical and organizational measures including:
    • • Encryption in transit (TLS 1.3) and at rest (AES-256)
    • • Access controls and multi-factor authentication
    • • Regular security audits and penetration testing
    • • Contractual commitments from subprocessors to resist unlawful government data requests

For Transfers to India:

  • Standard Contractual Clauses: Used for transfers to India-based processors (Razorpay, Freshchat)
  • Adequacy Considerations: We monitor developments regarding India's adequacy status under GDPR

For Transfers to Other Countries:

We rely on appropriate transfer mechanisms recognized under applicable data protection laws, including SCCs, adequacy decisions, or other lawful mechanisms.

Obtaining Copies of Safeguards:

You can request a copy of the safeguards we use for international transfers by contacting privacy@youkti.com. Note that we may redact commercially sensitive information.

7.3 Data Processing Addendum (DPA)

Enterprise customers who are data controllers under GDPR can execute our Data Processing Addendum, which includes:

  • • Standard Contractual Clauses for international transfers
  • • Detailed security measures
  • • Subprocessor management procedures
  • • Data subject rights assistance

Access our DPA at: www.youkti.ai/legal/dpa

8. Artificial Intelligence and Machine Learning

8.1 AI Features We Offer

Our Platform incorporates artificial intelligence and machine learning technologies to provide the following features:

Email Generation

AI-powered personalized outreach emails and communication templates

Meeting Analysis

Transcription, summarization, and action item extraction from sales meetings

Sales Insights

AI-generated recommendations, next-best-actions, and opportunity analysis

Lead Scoring

Predictive analytics to prioritize leads based on likelihood to convert

Content Analysis

Natural language processing to analyze emails, messages, and documents

Pattern Recognition

Identification of trends, patterns, and anomalies in sales activities

8.2 AI Model Providers and Processing Architecture

ARYA uses a multi-model architecture where different AI models handle different stages of processing. Your data may be processed by multiple models in a single request:

External AI Providers (Third-Party API Calls):

ProviderModels UsedPurpose
AnthropicClaude (Sonnet, Opus, Haiku)Email generation, meeting analysis, insights, conversational AI
OpenAIGPT-4, GPT-4 Turbo, GPT-3.5Natural language processing, content generation, analysis
GoogleGemini Pro, Gemini FlashText generation, multi-modal analysis, insights

Your data sent to these external providers is NOT used to train their public AI models. We have contractual "zero data retention" agreements with all external AI providers.

Internal AI Processing (Youkti-Hosted):

In addition to external providers, ARYA uses internally hosted AI models running on our own cloud infrastructure (AWS/GCP) for the following purposes:

FunctionPurposeData Processed
Intent AnalysisUnderstanding and classifying your requestsYour query text and conversation context
Tool RoutingDetermining which integrated tools to useRequest metadata and intent classification
Action AssessmentEvaluating risk level of proposed actionsAction parameters, historical patterns
Response OptimizationSelecting the most efficient model for simple queriesQuery complexity assessment

Important distinctions about internally hosted models:

  • • These models run entirely on our cloud infrastructure (AWS/GCP) — your data is not sent to additional third parties
  • • We do NOT fine-tune or train these internal models on individual customer data
  • • Internal models may be updated or improved using anonymized, aggregated performance metrics only
  • • All internal model processing is subject to the same encryption, access controls, and audit logging as other platform operations

AI-Tool Communication Protocol:

ARYA communicates with integrated tools through a standardized protocol layer (Model Context Protocol) that manages connections, handles authentication, and maintains audit trails for all AI-to-tool interactions. This protocol layer:

  • • Runs entirely on our cloud infrastructure (AWS/GCP)
  • • Does not transmit data to additional third parties
  • • Maintains connection-level encryption and per-request authentication
  • • Generates audit logs for all tool interactions (retained for 90 days)

The protocol layer is an internal infrastructure component — not a separate subprocessor — as it operates within our own cloud environment.

8.3 Your Data and AI Training

WE DO NOT USE YOUR DATA TO TRAIN PUBLIC AI MODELS

  • Your prompts, inputs, and AI-generated outputs are NOT used to train Anthropic's, OpenAI's, or Google's public AI models
  • We have contractual agreements with all AI providers that explicitly prohibit the use of customer data for model training
  • Your AI interactions are processed on a per-request basis and are not retained by AI providers for training purposes
  • We implement "zero data retention" clauses in our agreements with AI providers wherever possible

What We MAY Use for Improvement:

  • ❌ We do NOT share your specific prompts or outputs with AI providers for training
  • ✅ We MAY use aggregated, anonymized usage patterns to improve our own Platform features
  • ✅ We MAY analyze anonymized performance metrics to optimize AI integration

All such internal analysis is conducted on anonymized data that cannot identify you or your organization.

8.4 AI Limitations and Risks

Important: AI-generated content is probabilistic and may contain errors.

You acknowledge and agree that:

AI Can Make Mistakes ("Hallucinations"):

  • • AI models may generate factually incorrect information
  • • Names, statistics, quotes, or references may be invented or inaccurate
  • • Context may be misunderstood, leading to inappropriate responses

AI May Exhibit Bias:

  • • AI models are trained on data that may contain societal biases
  • • Outputs may reflect gender, racial, cultural, or other biases
  • • Recommendations may not be suitable for all audiences or contexts

AI Cannot Replace Human Judgment:

  • • AI-generated emails should be reviewed before sending
  • • AI insights should be validated before making business decisions
  • • Meeting summaries may miss nuance, tone, or important context
  • • Lead scoring is predictive, not deterministic

Your Responsibilities:

  • Review all AI-generated emails for accuracy, appropriateness, and compliance before sending
  • Validate AI insights before making significant business decisions
  • Apply human oversight to all AI outputs, especially for high-stakes use cases
  • Do not rely solely on AI for legal, financial, or other critical decisions
  • Ensure compliance with anti-spam laws when using AI-generated marketing content

8.5 Automated Decision-Making and Profiling

We use AI for the following types of automated processing:

Behavioral Profiling:

We use graph-based analytics to build relationship maps and behavioral patterns from your sales activities. This constitutes "profiling" under GDPR Article 4(4). Specifically:

  • What we profile: Sales workflow sequences, communication patterns, account relationship structures, and engagement success rates
  • Purpose: To power AI recommendations, predict next-best-actions, prioritize leads, and improve ARYA's contextual understanding
  • Impact: Profiling data influences the suggestions, insights, and prioritizations ARYA provides. It does not produce legal effects or restrict your access to features
  • Tenant isolation: Behavioral profiles are strictly isolated per organization. Cross-tenant pattern analysis is performed only on anonymized, aggregated data

Your rights: You can request a copy of your behavioral profile data, object to profiling under GDPR Art. 21, or request deletion of your pattern data by contacting privacy@youkti.com. Objecting to profiling may reduce the personalization and accuracy of AI-powered features

Lead Scoring:

  • • We use AI to analyze prospect engagement and assign scores predicting likelihood to convert
  • • This is based on behavioral patterns, engagement history, and firmographic data
  • Impact: Higher-scored leads may be prioritized in your workflow

Your Right: You can override AI lead scores manually and disable auto-scoring in settings

Email Deliverability:

  • • We use automated spam detection to prevent delivery of emails that may violate anti-spam laws
  • Impact: Emails flagged as potential spam may be blocked or require manual review

Your Right: You can request manual review of blocked emails

Anomaly Detection:

  • • We use AI to detect unusual account activity that may indicate fraud or security breaches
  • Impact: Suspicious activity may trigger security alerts or temporary account restrictions

Your Right: You can contest security restrictions by contacting support@youkti.com

Automated Decision-Making: ARYA performs certain low-risk automated actions on your behalf (see Section 8.7) such as CRM updates and task creation. These actions are governed by rules you configure and can be disabled at any time.

For actions that may have significant impact — such as sending communications to external parties, modifying deals, or scheduling commitments — ARYA requires your explicit approval before execution. We do not make solely automated decisions that produce legal effects concerning you (such as account termination or billing changes) without human review.

8.6 ARYA Autonomous Actions

ARYA, our AI agent, can perform actions on your behalf across your connected tools. Actions are classified into tiers based on risk and impact:

Automatic Actions (Low Risk):

ARYA may automatically perform the following actions without requiring your explicit approval for each instance:

  • • Updating CRM fields (e.g., logging call notes, updating contact status)
  • • Creating follow-up tasks based on predefined triggers (e.g., prospect opens an email)
  • • Logging sales activities and updating pipeline data
  • • Syncing data between connected platforms

These automatic actions are governed by rules and triggers you configure in your account settings. You can enable or disable automatic actions at any time under Settings > ARYA > Automation Preferences.

Suggested Actions (Medium Risk):

For actions with greater impact, ARYA will draft the action and present it for your review and approval before execution:

  • • Sending emails or messages to prospects/customers
  • • Scheduling meetings on your behalf
  • • Creating or modifying deals/opportunities in your CRM

Multi-factor authentication may be required for certain suggested actions

Strategic Actions (Reviewed):

Long-term recommendations such as campaign adjustments, territory planning, or account strategy changes are presented as suggestions only and are never auto-executed.

High-Risk Escalation:

Actions that ARYA's risk assessment flags as potentially harmful, non-compliant, or unusual are escalated for human review by your organization's administrator or our security team. These are never executed automatically.

Your Controls:

  • Configure which action categories ARYA can auto-execute in Settings > ARYA > Automation Preferences
  • Set approval requirements for specific action types
  • Review a complete audit log of all ARYA actions (automatic and approved) in Settings > ARYA > Activity Log
  • Disable all automatic actions entirely if preferred
  • All actions are logged with full audit trails including timestamps, action type, trigger reason, and outcome

8.7 Your AI Controls

You have the following controls over AI features:

  • Opt-Out: You can disable AI features in your account settings (note: this may limit platform functionality)
  • Delete AI History: You can request deletion of your AI interaction history by contacting privacy@youkti.com
  • Feedback: You can report inaccurate or inappropriate AI outputs to help us improve
  • Transparency: You can request information about how a specific AI decision was made

8.8 AI Infrastructure and Communication Protocol

AI-Tool Communication Protocol:

ARYA communicates with integrated tools through a standardized protocol layer (Model Context Protocol) that manages connections, handles authentication, and maintains audit trails for all AI-to-tool interactions. This protocol layer:

  • • Runs entirely on our cloud infrastructure (AWS/GCP)
  • • Does not transmit data to additional third parties
  • • Maintains connection-level encryption and per-request authentication
  • • Generates audit logs for all tool interactions (retained for 90 days)

The protocol layer is an internal infrastructure component — not a separate subprocessor — as it operates within our own cloud environment.

9. Data Retention and Deletion

We retain personal information only for as long as necessary to fulfill the purposes described in this Privacy Policy, comply with legal obligations, resolve disputes, and enforce our agreements.

9.1 Retention Periods

Data CategoryRetention PeriodLegal Basis
Account informationDuration of subscription + 90 daysContract performance, legal obligations
Customer Data (CRM, emails, activities)Duration of subscription + 30 daysContract performance
AI interaction historyDuration of subscription + 60 daysLegitimate interests (service improvement)
Behavioral pattern data (graph database)Duration of subscription + 60 daysLegitimate interests (AI personalization)
Semantic search embeddings (vector database)Duration of subscription + 60 daysLegitimate interests (AI contextual retrieval)
Tool execution cache (web search results)5-30 minutesLegitimate interests (performance, reduced API calls)
Tool execution cache (CRM data)4-24 hoursLegitimate interests (performance, rate limit management)
Tool execution cache (social/communication data)12-48 hoursLegitimate interests (performance, API rate limits)
Tool execution cache (company/firmographic data)7-30 daysLegitimate interests (performance, data stability)
Security verification cache5 minutesLegitimate interests (real-time security)
Fraud detection and security logs1 yearLegitimate interests (security, fraud prevention)
Payment transaction records7 yearsLegal obligations (tax, accounting laws)
Marketing communications consentUntil withdrawn or 3 years of inactivityConsent (GDPR Art. 6(1)(a))

Caching:

To improve performance and reduce latency, we temporarily cache tool execution results. Cached data is encrypted, tenant-isolated, and automatically purged according to the retention periods above. Cache data is never used for purposes other than serving subsequent similar requests within the same tenant.

9.2 Account Termination and Data Export

When your account is terminated or you cancel your subscription:

  • • You have 30 days to export your data before deletion begins
  • • After 30 days, we begin the deletion process according to the retention periods above
  • • Some data may be retained longer if required by law or for legitimate business purposes (e.g., fraud prevention, legal disputes)

9.3 Deletion Methods

When we delete personal data:

  • • Data is permanently deleted from production systems and cannot be recovered
  • • Backup copies are overwritten or deleted within 90 days
  • • Cached data is purged immediately

9.4 Extended Retention

We may retain data longer than specified periods if:

  • • Required by law (e.g., tax records, legal holds)
  • • Necessary to establish, exercise, or defend legal claims
  • • You have explicitly consented to longer retention

9.5 Your Rights

You can request early deletion of your data before retention periods expire (subject to legal exceptions). See Section 10 for instructions.

10. Your Privacy Rights

Depending on your location, you have the following rights regarding your personal information:

10.1 Rights Available to Everyone

Right to Access

  • • Request a copy of the personal information we hold about you
  • • Understand how we collect, use, and share your data

Right to Correction

  • • Correct inaccurate or incomplete personal information
  • • Update your account information directly in platform settings

Right to Deletion

  • • Request deletion of your personal information (subject to legal exceptions)
  • • Close your account and have your data removed

Right to Opt-Out of Marketing

  • • Unsubscribe from marketing emails, newsletters, and promotional communications
  • • Adjust communication preferences in account settings

Right to Data Portability

  • • Receive your personal information in a structured, machine-readable format (CSV, JSON)
  • • Transfer your data to another service provider

10.2 Additional Rights for EU/UK Users (GDPR)

  • Right to Restriction: Request that we limit how we use your data while a dispute is being resolved
  • Right to Object: Object to processing based on legitimate interests (including profiling and analytics)
  • Rights Related to Automated Decision-Making: Not be subject to solely automated decisions with legal or similarly significant effects
  • Right to Withdraw Consent: Withdraw consent for processing based on consent (e.g., marketing emails)

10.3 How to Exercise Your Rights

Through Your Account

  • • Log into your account at www.youkti.com
  • • Navigate to Settings > Privacy & Data
  • • Use self-service tools to download, correct, or delete data

By Email

  • • Send requests to: privacy@youkti.com
  • • Subject line: "Privacy Rights Request - [Your Right]"
  • • Include: Your full name, email address, account details, and specific request

By Mail

Aryacognis Pvt Ltd
Attn: Data Privacy Team
Bangalore, Karnataka
India

10.4 Verification and Response

Identity Verification:

To protect your privacy, we must verify your identity before fulfilling requests. We may ask you to:

  • • Provide information matching your account records
  • • Respond from your registered email address
  • • Complete additional authentication steps for sensitive requests

Response Timeline:

  • • We will respond to your request within 30 days (GDPR) or 45 days (CCPA)
  • • If we need more time, we'll notify you and explain why
  • • Complex requests may take up to 60 days (GDPR) or 90 days (CCPA)

No Cost:

We will process most requests free of charge. We may charge a reasonable fee for manifestly unfounded or excessive requests, or repetitive requests for the same information.

10.5 Limitations and Exceptions

We may deny or limit requests when:

  • • We need the data to comply with legal obligations (e.g., tax records)
  • • Necessary to establish, exercise, or defend legal claims
  • • Required to protect vital interests of individuals
  • • Covered by legal or professional privilege
  • • Would reveal confidential business information

If we deny a request, we'll explain why and inform you of your right to complain to a supervisory authority.

10.6 Authorized Agents

You may designate an authorized agent to make privacy requests on your behalf. The agent must:

  • • Provide written authorization signed by you
  • • Verify their own identity
  • • Provide proof of their authority to act on your behalf

11.1 EU/EEA Users

You may contact your local data protection authority in the EU member state where you reside, work, or where the alleged violation occurred.

List of EU Data Protection Authorities:

edpb.europa.eu/about-edpb/board/members_en

Example:

• Ireland: Data Protection Commission - dataprotection.ie

• Germany: Bundesbeauftragter für den Datenschutz - bfdi.bund.de

11.2 UK Users

Information Commissioner's Office (ICO)

11.3 Indian Users

Data Protection Authority (when operational)

India is in the process of establishing a Data Protection Board under the Digital Personal Data Protection Act, 2023. Once operational, you may lodge complaints with this authority.

For current consumer grievances:

11.4 US Users (State-Specific)

California:

California Attorney General - Privacy Enforcement

Website: oag.ca.gov/privacy

Other States: Check your state attorney general's website for privacy complaint procedures.

11.5 Before Filing a Complaint

We encourage you to contact us first at privacy@youkti.com so we can address your concerns directly. Many issues can be resolved faster through direct communication than through formal complaints.

However, you have the right to lodge a complaint at any time, even without contacting us first.

12.1 Information We Collect (CCPA Categories)

In the past 12 months, we have collected the following categories of personal information:

CCPA CategoryExamplesCollected?
A. IdentifiersName, email, phone number, IP address, account username✅ Yes
B. California Customer RecordsName, address, phone, payment information✅ Yes
C. Protected ClassificationsAge, gender (only if voluntarily provided)⚠️ Limited
D. Commercial InformationPurchase history, subscription details✅ Yes
E. Biometric InformationFingerprints, voiceprints, facial recognition❌ No
F. Internet/Network ActivityBrowsing history, search history, website interactions✅ Yes
G. Geolocation DataApproximate location based on IP address (city/country)⚠️ Non-precise only
H. Sensory InformationAudio recordings (meeting transcripts if enabled)⚠️ Only if you enable
I. Professional/EmploymentJob title, company, work email✅ Yes
J. Education InformationSchool, degree (if voluntarily provided in profile)⚠️ Limited
K. InferencesProfiles reflecting preferences, behavior, lead scores✅ Yes
L. Sensitive Personal InformationSocial security, financial account numbers, health data❌ No

12.2 How We Use Personal Information

We use the categories of personal information listed above for the business and commercial purposes described in Section 3.

12.3 Sale and Sharing of Personal Information

We do NOT "sell" or "share" personal information as defined by CCPA/CPRA.

  • ❌ We do not sell personal information to third parties for monetary consideration
  • ❌ We do not share personal information with third parties for cross-context behavioral advertising
  • ❌ We do not sell or share personal information of consumers under 16 years of age

If this changes in the future, we will update this Privacy Policy, provide notice, and offer an opt-out mechanism.

12.4 Your California Privacy Rights

Right to Know

Request disclosure of categories and specific pieces of personal information we collected, sources, purposes, and third parties we shared it with

Right to Delete

Request deletion of your personal information, subject to certain exceptions (e.g., legal obligations, fraud prevention)

Right to Correct

Request correction of inaccurate personal information we maintain about you

Right to Non-Discrimination

We will not discriminate against you for exercising your CCPA rights (deny services, charge different prices, etc.)

12.5 How to Exercise California Rights

Online:

Visit our Privacy Request Portal at: www.youkti.ai/privacy-request

Email:

privacy@youkti.com

Subject: "California Privacy Rights Request"

Phone:

Email-only requests accepted

A toll-free telephone number will be made available in a future update to this policy

Response Time: We will respond within 45 days. If we need more time (up to 90 days total), we'll notify you.

12A.1 Your Rights Under DPDPA

As a Data Principal (individual whose data is processed), you have the right to:

Confirmation and Summary

Obtain confirmation of whether your personal data is being processed and a summary of such processing

Correction and Erasure

Correction and erasure of inaccurate or outdated personal data

Nomination

Nominate another individual to exercise your rights in case of death or incapacity

Grievance Redressal

We will respond to complaints within the timeframes prescribed by the Data Protection Board of India

12A.2 Consent Management

Where we rely on consent as the legal basis for processing (e.g., marketing communications), we obtain clear, specific, and informed consent as required by the DPDPA. You may withdraw consent at any time by:

  • • Contacting privacy@youkti.com
  • • Through your account settings
  • • Clicking "Unsubscribe" in marketing emails

Withdrawal of consent will not affect the lawfulness of processing prior to withdrawal.

12A.3 Cross-Border Data Transfers

We transfer personal data outside India to the United States and other countries where our cloud infrastructure and subprocessors operate. We conduct such transfers in compliance with DPDPA requirements, including any restrictions or conditions that may be notified by the Central Government of India.

We do not transfer personal data to countries that the Central Government may restrict under Section 16(1) of the DPDPA.

12A.4 Grievance Officer

In accordance with DPDPA requirements, our Grievance Officer can be contacted at:

  • Email: grievance@youkti.com (or dpo@youkti.com)
  • Response time: Within 30 days of receiving your complaint

12A.5 Data Protection Board

Once the Data Protection Board of India is fully operational, you will have the right to lodge complaints with the Board regarding our data processing practices.

13.1 Technical Security Measures

  • Encryption: TLS 1.3 in transit, AES-256 at rest
  • Access Controls: MFA, RBAC, least privilege
  • Network Security: Firewalls, IDS/IPS, DDoS protection
  • Application Security: SDLC, code reviews, penetration testing
  • Data Backup: Automated backups, encrypted, tested regularly
  • Database Security: Our platform uses multiple database technologies including PostgreSQL (primary relational database) and MongoDB (document database) for different data storage needs. Both databases are hosted on our cloud infrastructure (AWS/GCP), encrypted at rest using AES-256, and subject to the same access controls and security measures
  • Data Synchronization: We use real-time data streaming technology (Apache Kafka) to synchronize data between our primary database and analytical systems. This ensures that AI features have access to up-to-date information while maintaining data consistency. Critical data changes are synchronized within seconds; analytical data is synchronized on a periodic schedule (every 15-60 minutes). All data in transit through our synchronization pipeline is encrypted and access-controlled

13.2 Organizational Security Measures

  • Personnel Security: Background checks, confidentiality agreements, training
  • Physical Security: Biometric access, 24/7 surveillance, ISO 27001 certified data centers
  • Vendor Management: Due diligence, contractual protections, ongoing monitoring
  • Incident Response: 24/7 team, documented procedures, forensics capability

13.3 Privacy-Enhancing Technologies

We employ differential privacy techniques when using aggregated platform usage data to improve our AI models and features. Differential privacy adds mathematical noise to aggregated datasets, ensuring that no individual user's data can be identified or extracted from the aggregate.

This allows us to learn from platform-wide patterns while preserving individual privacy. Differential privacy is applied only to anonymized, aggregated analytics data and is never used on individual customer data or content.

13.4 Healthcare Data (HIPAA)

If your organization operates in the healthcare sector and requires HIPAA compliance, please contact legal@youkti.com before uploading any Protected Health Information (PHI) to the Platform.

Important: Standard accounts are not configured for HIPAA-compliant data processing. Enterprise customers requiring HIPAA compliance must execute a Business Associate Agreement (BAA) with Youkti, which enables additional technical safeguards including:

  • • Enhanced access logging and audit trails
  • • PHI-specific encryption controls
  • • Restricted data processing paths
  • • Additional security monitoring and breach notification procedures

Without a BAA in place, you must not upload, process, or store any PHI through the Platform.

14. Data Breach Notification

14.1 What Constitutes a Data Breach

A data breach (or "Security Incident") occurs when there is:

  • • Unauthorized access to, or acquisition of, personal data
  • • Accidental or unlawful destruction, loss, or alteration of personal data
  • • Unauthorized disclosure of personal data
  • • Any other compromise of data security that poses a risk to your rights and privacy

14.2 Our Response to a Breach

Immediate Actions:

  • Contain the Breach: Stop unauthorized access and prevent further data loss
  • Investigate: Determine scope, nature, and impact
  • Remediate: Address vulnerabilities and prevent recurrence
  • Preserve Evidence: Secure logs for forensic analysis

Assessment:

  • • What personal data was affected
  • • How many individuals are impacted
  • • The likely consequences and severity
  • • Whether the breach poses a "high risk" to individuals' rights

14.3 Notification to You

Timing:

We will notify you without undue delay and in any event:

  • Within 72 hours of becoming aware of a breach that is likely to result in a high risk to your rights and freedoms (GDPR requirement)
  • • As soon as reasonably practical, but no later than required by applicable law

How We Notify:

  • • Email to your registered account email address
  • • In-App Notification when you log into the platform
  • • Website Banner - prominent notice on our homepage
  • • Direct Contact to account administrators for enterprise customers

What We'll Tell You:

  • Nature of the Breach: Description of what happened and how it occurred
  • Data Affected: Categories and approximate number of individuals affected
  • Consequences: Likely consequences of the breach for you
  • Contact Point: Name and contact details of our Data Protection Officer
  • Mitigation Measures: Measures we have taken or propose to take
  • Your Recommended Actions: Steps you should take to protect yourself

14.5 Your Actions After a Breach

If you receive a breach notification from us:

Immediate Steps:

  • ✅ Follow our recommendations (e.g., password reset, enable MFA)
  • ✅ Monitor your accounts for suspicious activity
  • ✅ Be alert for phishing - scammers may impersonate Youkti

Report Suspicious Activity:

Your Legal Rights:

  • • You have the right to lodge a complaint with a data protection authority (see Section 11)
  • • You may have the right to compensation if you suffered material or non-material damage due to the breach

15.1 What Administrators Can See and Do

Account Management

  • • View and manage user accounts
  • • Add or remove users
  • • Reset passwords
  • • Enable/disable user access
  • • Configure account settings

Data Access

  • • View user activity logs
  • • Access emails and meeting notes
  • • View AI prompts and content
  • • Export organizational data
  • • Access CRM and pipeline data

Analytics & Configuration

  • • View usage metrics
  • • Generate performance reports
  • • Monitor email deliverability
  • • Configure security settings
  • • Manage integrations

15.2 Why Administrators Have This Access

Enterprise customers purchase Youkti to manage their sales teams and operations. Administrator access enables:

  • Team Management: Onboarding, offboarding, and managing team members
  • Security: Monitoring for suspicious activity and enforcing security policies
  • Compliance: Ensuring team members comply with organizational policies and legal requirements
  • Performance Management: Evaluating team productivity and effectiveness
  • Data Ownership: Organizations own the data created by their employees using organizational accounts

15.3 Employer-Employee Relationship

Important: When you use Youkti through your employer's account:

  • • Your employer is the customer, not you individually
  • • Your employer owns the account and all data within it
  • • Your employer determines how the platform is used and what data is collected
  • • Your employer controls your access to the platform

Youkti acts as a data processor on behalf of your employer (the data controller). Your employer is responsible for informing you about data collection and use, obtaining necessary consents, and ensuring lawful processing of your data.

15.4 AI Agent Delegation

Within enterprise accounts, ARYA may perform actions that involve delegation — where an authorized user's request triggers ARYA to interact with systems using permissions granted by that user or their organization. For example:

  • • A sales manager may configure ARYA to perform CRM updates on behalf of their team
  • • An administrator may authorize ARYA to send scheduled reports using shared organizational credentials

All delegated actions are:

  • • Governed by your organization's permission settings and access controls
  • • Logged with full audit trails showing who authorized the delegation, what action was performed, and when
  • • Subject to the same security checks and risk assessment as direct user actions

Delegation authority is configured by your organization's administrators. Individual users cannot delegate beyond their own permission scope.

15.5 Your Privacy Protections

Best Practices:

  • Assume visibility: Treat your organizational account as visible to your employer
  • Use personal accounts for personal matters: Don't use your work Youkti account for personal sales activities
  • Review organizational policies: Understand your employer's policies on data access and monitoring
  • Be professional: Avoid sharing sensitive or inappropriate information through the platform
  • Ask questions: If unsure what your employer can see, ask your IT department or HR

16.1 Our Anti-Spam Policy

Prohibited Activities

You may NOT use Youkti to:

  • ❌ Send unsolicited commercial emails (spam) in violation of CAN-SPAM, GDPR, CASL, or other anti-spam laws
  • ❌ Send emails to purchased or rented email lists
  • ❌ Send emails to individuals who have not provided consent (where required by law)
  • ❌ Continue emailing individuals who have opted out or unsubscribed
  • ❌ Use deceptive subject lines, false headers, or misleading "from" information
  • ❌ Fail to include a valid physical address in commercial emails
  • ❌ Fail to provide a working unsubscribe mechanism

16.2 Required Compliance

Obtain Proper Consent:

  • • Obtain express consent before emailing individuals in jurisdictions requiring it (EU/GDPR, Canada/CASL)
  • • Maintain records of consent (date, method, what was consented to)
  • • Only email business contacts for legitimate B2B purposes

Include Required Disclosures:

  • Accurate "From" Information: Use your real name and company name
  • Clear Subject Lines: Accurately reflect the content
  • Physical Address: Include your valid postal address (CAN-SPAM)
  • Unsubscribe Mechanism: Provide a clear, easy way to opt out

16.6 Applicable Laws

Youkti email features must comply with:

  • United States: CAN-SPAM Act, TCPA
  • European Union / UK: GDPR, ePrivacy Directive / PECR
  • Canada: CASL (one of the strictest anti-spam laws globally)
  • India: TRAI Regulations, IT Act
  • Other Jurisdictions: Comply with local anti-spam laws where your recipients are located

17.1 Age Requirement

You must be at least 16 years of age to use our Services.

If you are under 16 years of age, you may NOT:

  • ❌ Create a Youkti account
  • ❌ Use our Services
  • ❌ Provide any personal information to us

This age requirement aligns with GDPR's definition of the age of consent for processing personal data (Article 8).

18.1 Third-Party Websites

For more information about how our AI providers handle data:

19.1 Right to Modify

We may update this Privacy Policy from time to time to reflect:

  • • Changes in our data practices or Services
  • • New features or functionality
  • • Changes in applicable laws or regulations
  • • Guidance from data protection authorities
  • • Industry best practices and security standards
  • • Changes to our subprocessors or service providers

19.2 How We Notify You of Changes

Material Changes:

If we make material changes that significantly affect your rights, we will notify you 30 Days Before Changes Take Effect:

  • • Email Notification to your registered email address
  • • In-App Banner when you log into the Platform
  • • Website Homepage Notice at the top of www.youkti.com

Non-Material Changes:

For minor, non-material changes (e.g., clarifications, formatting, contact information updates):

  • • Update the "Last Updated" date at the top of this Privacy Policy
  • • Post the revised policy on our website

19.3 How to Review Changes

Always Current Version: The most current version of this Privacy Policy is always available at: www.youkti.ai/legal/privacy

Version History: We maintain a version history of this Privacy Policy showing what changed and when. Access it at: www.youkti.ai/legal/privacy-history

Your Responsibility: We recommend you review this Privacy Policy periodically to stay informed about how we protect your data.

19.4 Your Options After Changes

If You Agree with Changes:

  • • Continue using the Services
  • • Your continued use after changes become effective constitutes acceptance of the updated Privacy Policy

If You Do NOT Agree with Material Changes:

  • • Stop Using the Services before changes take effect
  • • Delete Your Account via Settings or by contacting privacy@youkti.com
  • • Data Export: Export your data before deletion (30-day export period applies)

20. Contact Us

General Privacy Inquiries

Email: privacy@youkti.com

Response Time: Within 5 business days

Data Protection Officer

Email: dpo@youkti.com

For GDPR-related matters

Security Incidents

Email: security@youkti.com

Response: Within 24 hours

Customer Support

Email: support@youkti.com

Mon-Fri: 9 AM - 6 PM IST

Mailing Address

Aryacognis Pvt Ltd (trading as Youkti)
Attn: Data Privacy Team
Bangalore, Karnataka
India

Thank you for trusting Youkti with your data.

We are committed to protecting your privacy and being transparent about our data practices.

© 2025 Aryacognis Pvt Ltd. All rights reserved.

Get Started Today

Execute from day one.
Not after weeks of setup.