Service Organization Controls (Soc2) (Type II) Trust Services Principles

Information Security Management System (ISMS)

Artificial Intelligence Management System (AIMS)

U.K. Gov't backed Cybersecurity standard
Protect the personal data and privacy of EU citizens for transactions that occur within EU member states
California Consumer Privacy Act
Health Insurance Portability and Accountability Act (please see FAQ).
Resources
Get our latest security and compliance resources and reports
Cohere undergoes an annual SOC 2 Type II audit. Request here to see our report.
Official Certificate
Official Certificate
Cohere's official issued certificate
API and web application penetration test results
Rules of engagement for conducting and performing security research (i.e. vulnerability discovery) activities for participating in our Bug Bounty Program.
Overview of how Cohere handles and protects our Enterprise Customers' Data
This document outlines Cohere's risk management methodology for managing risks to our models.
This policy outlines the acceptable use cases for Cohere’s models and products by customers
Specific documentation on Cohere's Product and Services including guides and concepts, API technical documentation, release notes, and cookbooks.
Infrastructure service provider Location: USA

Software delivery platform Location: USA
Feature Flagging Location: USA

Platform Monitoring Location: USA

Software delivery platform Location: USA

Fraud and Abuse Detection Location: USA, Australia

Customer support Location: USA
Event and Error Handling Location: USA

Event and Error Handling Location: USA
