What the CISO, Legal, and Privacy reviewer needs first — Heyou's data scope, control boundaries, AI posture, subprocessors, and incident commitments.
1. What Heyou Does ¶
Heyou is a relationship intelligence platform that helps organizations understand existing professional relationships and identify relevant, human-led paths into target accounts.
Heyou analyzes authorized professional relationship context to help users answer questions such as:
- Who in our organization already has relevant context around this person or account?
- Which relationships are strongest or most relevant right now?
- What recent signal, shared context, or existing path could make outreach more thoughtful?
- What should the user review before deciding whether to engage?
Heyou is designed to improve professional engagement by helping users understand context before they act. It is not designed to replace user judgment or operate external accounts on a user’s behalf.
2. Human-Led Engagement by Design ¶
Heyou is designed as a decision-support and engagement-assist platform.
The system may analyze relationship and business context, recommend next-best actions, summarize relevant signals, and prepare draft messages for user review. External actions remain under human control.
Heyou does not automatically send messages, connection requests, comments, likes, follows, posts, profile changes, or similar externally visible engagement actions on behalf of users.
Heyou also does not use automated processing to make decisions that produce legal or similarly significant effects on individuals. AI-generated recommendations, relationship scores, summaries, and drafts are assistive outputs. Users remain responsible for reviewing, validating, editing, approving, and executing any action.
Control summary
- AI suggests; users review and decide.
- External actions require user control and confirmation.
- Heyou does not automate externally visible engagement actions.
- Heyou is not intended for hiring, firing, promotion, performance evaluation, compensation, credit, insurance, immigration, housing, or other high-stakes decisions.
- Human review and action logs support auditability.
3. Contractual and Policy Framework ¶
This public overview is supported by a broader contractual and policy framework.
Master Services Agreement / Terms of Service governs commercial use of Heyou, including access rights, permitted use, customer responsibilities, confidentiality, data export and deletion, warranties, indemnities, liability, insurance, and order-form structure.
Data Processing Addendum governs Heyou’s processing of Customer Data where Heyou acts as a processor on behalf of the customer. It covers processing purposes, data categories, data-subject categories, subprocessors, international transfers, breach notification, audit rights, deletion and return obligations, and technical and organizational measures.
Privacy Policy explains Heyou’s public-facing privacy posture, including how Heyou organizes data, the distinction between organizational and personal tiers, sharing practices, international transfers, retention, data-subject rights, government requests, and automated-decisioning limits.
Supporting policies and schedules include the Responsible AI Policy, Acceptable Use Policy, Data Retention and Deletion Schedule, Cookie Policy, Subprocessor List, and Security Overview.
Where there is a conflict between this overview and a signed agreement, the signed agreement and applicable DPA control.
4. Data Scope and Visibility Boundaries ¶
Heyou separates processed data into two primary tiers based on source, visibility, and control.
4.1 Organizational Data Tier ¶
Organizational data includes professional relationship and business context that the customer or authorized users make available for use within the customer workspace.
Examples may include:
- CRM records and business contacts.
- Corporate email and calendar metadata, where enabled by the customer.
- Employee directory and organizational relationship data.
- Professional relationship context contributed by authorized users in the course of their work.
- Public professional profile fields or public professional content available to an authorized user.
- Derived relationship signals and AI-assisted outputs generated from authorized sources.
Organizational data is available within the customer tenant according to the customer’s internal permission model and Heyou’s role-based access controls.
4.2 Personal Data Tier ¶
Personal-tier data includes data an individual user explicitly chooses to connect from intrinsically personal or user-controlled resources.
Examples may include:
- Private email accounts.
- Personal messaging environments.
- Private one-to-one direct messages visible only to that user.
- Other user-controlled sources, where enabled by the customer and authorized by the user.
Personal-tier data is private by default. It is not visible to customer admins, managers, or other workspace users unless the individual user affirmatively chooses to share specific data with the organization.
For private messaging and similar sources, Heyou processes metadata only, such as participants, timestamps, interaction frequency, and other non-content signals needed to understand relationship context. Heyou does not ingest, store, or analyze the content of personal messages connected as personal-tier data.
4.3 User-Identified Targets ¶
A user may identify a person they want to reach who is not already present in the customer’s connected systems. In these cases, Heyou processes only the minimum information needed to surface a relevant relationship-path recommendation.
Heyou does not contact such individuals on the customer’s behalf. Any outreach is initiated by the user through the user’s own approved channels.
5. User-Authorized Sources and Responsible Relationship Intelligence ¶
Heyou distinguishes between company-owned systems, customer-approved business sources, and user-authorized sources that an individual user may choose to connect, enable, export, upload, or contribute.
Heyou is designed around a clear separation of control:
- Users control whether to authorize user-controlled sources.
- Customers control which source categories are permitted in their tenant.
- Heyou provides privacy, security, data-minimization, and governance controls.
Where user-authorized sources are enabled, Heyou’s access is view-limited and purpose-limited. Heyou reads the professional relationship context required to analyze the user’s network and provide relationship intelligence, subject to the customer’s tenant configuration, user authorization, lawful basis, and applicable product controls.
Heyou does not write back to third-party services or perform externally visible actions on behalf of users. Heyou does not automatically send messages, connection requests, comments, likes, follows, posts, profile changes, or similar engagement actions.
Heyou does not collect passwords, third-party platform credentials, or reusable third-party session tokens. Heyou does not bypass login, privacy settings, paywalls, technical access controls, restrictions, revocation signals, or customer disablement settings. Heyou does not continue source access after a user or customer disables that source.
Customer admins do not receive access to private user-controlled content unless the user has explicitly chosen to share specific data under the customer’s configured policy.
Customers can enable, limit, pause, or disable user-authorized source categories at the tenant level. Customers that prefer to avoid user-authorized external-source access can configure Heyou to operate using company-approved sources only.
Heyou is multi-source by design. No single user-authorized source is required for Heyou to operate. If a specific source is unavailable, disabled, restricted, or no longer appropriate for use, Heyou can continue operating using other customer-approved sources, such as CRM data, work email metadata, calendar metadata, meeting transcripts, approved business applications, native exports, and other authorized inputs.
Where a third-party service provides a user-facing notice, warning, restriction, or other indication related to source activity, Heyou does not control that notice or the service’s enforcement decisions. The user or customer can pause or disable the relevant source connection at any time.
Heyou is designed to minimize the amount of source information processed and retained by Heyou’s cloud systems. Where practical, source information may be transformed locally into normalized relationship signals and related metadata before being processed by Heyou.
Heyou’s goal is to generate relationship intelligence, not to store, reproduce, or redistribute third-party source content. Where relationship intelligence can be generated from metadata, derived signals, or locally transformed information, Heyou prefers those approaches. For private messaging and similar sources, Heyou processes metadata only and does not collect private conversation content.
6. Data Heyou Does Not Collect or Store as Part of the Standard Service ¶
Heyou does not collect or store the following as part of its standard service:
- Passwords for third-party services.
- Third-party platform credentials.
- Reusable third-party session tokens.
- Payment cardholder data.
- Children’s data.
- Content of personal messages connected as personal-tier data.
- Raw third-party source content where relationship intelligence can be generated from metadata, derived signals, or locally transformed information.
Heyou also does not source contact details from data brokers or third-party enrichment databases. When Heyou presents contact details, those details come from customer-authorized systems or user-authorized resources.
Heyou’s trust model includes strict limits on data reuse.
Heyou does not operate a shared contributor database, contact marketplace, or people-search product. Customer Data and User Data are not used to enrich a cross-customer contact directory. Heyou does not use one customer’s relationship graph, contact records, or user-authorized sources to generate recommendations, contact details, or relationship intelligence for another customer.
Heyou does not:
- Sell customer data or personal data.
- Operate, sell, or license a contact database.
- Build a Heyou-owned people-search product from customer data.
- Create a shared cross-customer contact directory.
- Use one customer’s data to generate recommendations, insights, or outputs for another customer.
- Aggregate personal data across customers to create a marketable directory.
- Use third-party enrichment or data-broker sources to obtain or supplement contact details.
- Give AI unrestricted access to user-authorized accounts, the open web, or external services.
- Provide administrators with access to private user-controlled content.
Customer data remains scoped to the customer or user context from which it was authorized.
7.1 Customer Controls and Configurability ¶
Heyou is designed to give customers control over how the platform is deployed in their environment. Depending on product configuration and plan, customers may control:
- Which source categories are enabled, limited, paused, or disabled.
- Which users, teams, or roles can access specific data and capabilities.
- Whether user-authorized external sources are allowed at all.
- Whether processing is limited to metadata for sensitive sources.
- Visibility boundaries for personal-tier and user-controlled sources.
- Retention and deletion settings where configurable.
- Audit logs and administrative review workflows.
- Source-level response to third-party notices, restrictions, or customer policy decisions.
These controls help customers align Heyou with their internal security, privacy, employment, and third-party service policies.
8. Architecture and Infrastructure Summary ¶
Heyou runs on Google Cloud Platform using managed cloud services and a tenant-isolated application design.
The current production architecture includes:
- Cloud CDN for front-end delivery.
- HTTPS Load Balancer with Serverless NEG routing to Cloud Run.
- Cloud Armor for edge protection.
- Cloud Run for application and API services.
- PostgreSQL-backed background job processing.
- Cloud SQL PostgreSQL for application data.
- Cloud Storage for tenant-scoped object storage.
- Secret Manager for secrets and credentials.
- Cloud Logging, Monitoring, and Audit Logs for observability and auditability.
- Cloud NAT for controlled static outbound egress.
- Google-managed encryption for storage at rest.
- Vertex AI / Gemini as an approved managed AI service boundary.
Customer data is logically isolated at the application, database, and object-storage layers. Personal-tier data is further scoped at the user level within a tenant.
Architecture and data-flow diagrams are available for enterprise security review.
9. Access Control and Operational Security ¶
Heyou maintains access-control and operational-security controls designed for enterprise environments.
Controls include:
- Role-based access control in the product.
- SSO support through standard enterprise identity protocols.
- MFA for internal administrative access.
- Least-privilege access for internal systems.
- Just-in-time, time-bound production access for approved operational needs.
- Logging of production access and administrative activity.
- Access reviews and revocation processes.
- Secure secrets management through managed cloud services.
- Centralized logging, monitoring, and incident-response processes.
10. AI Processing and Data Isolation Controls ¶
Heyou uses AI to generate relationship summaries, recommendations, draft messages, and related assistive outputs. AI processing is governed by data minimization, tenant isolation, and human oversight.
10.1 Third-Party Generative AI ¶
Heyou uses Google Gemini via Vertex AI as its approved third-party generative AI provider. Heyou’s AI features operate against authorized customer or user context. They are not designed to give AI unrestricted access to the open web, user-owned accounts, or external services.
Controls include:
- Customer data sent to third-party generative AI providers is not used by the provider to train foundation models.
- Region-aware processing is configured to align AI processing with the customer’s tenant region where supported by the provider, model, and endpoint configuration.
- Direct identifiers are minimized before third-party model calls where identifiers are not required for the task.
- Names, email addresses, phone numbers, and similar identifiers may be replaced with placeholders before a prompt is sent to the model.
- Heyou re-associates placeholders with original values inside Heyou after the model response returns.
10.2 Proprietary Relationship-Scoring Models ¶
Heyou does not use Customer Data or User Data to train third-party generative AI foundation models.
Heyou may use Customer Data and derived relationship signals to improve proprietary non-generative relationship-scoring, classification, calibration, and path-ranking models, subject to the customer agreement and DPA.
This use is purpose-limited to improving the Services and is governed by tenant isolation, access controls, and data minimization safeguards. Heyou does not use Customer Data to build a cross-customer contact directory, people-search database, or resold data product.
Heyou’s default posture is customer-scoped model improvement: business-specific relationship intelligence is learned and applied within the customer or user context from which the data was authorized. Heyou does not use one customer’s business-specific relationship graph, messaging patterns, account strategy, outreach performance, sales motion, or GTM process to generate business-specific recommendations for another customer.
Heyou may derive aggregated, de-identified, or statistical insights to improve service reliability, safety, calibration, and quality, provided those insights cannot reasonably identify a customer, user, data subject, or customer-specific business process. Any broader use of Customer Data for cross-customer model improvement is subject to the customer agreement, DPA, and applicable Order Form restrictions. Enterprise customers may address customer-specific model-improvement restrictions or opt-outs in the Order Form or DPA.
11. Certifications, Compliance, and Applicability ¶
Heyou maintains a security and privacy program aligned with enterprise customer requirements and relevant regulatory frameworks.
ISO/IEC 27001:2022**
**Heyou Research and Development Ltd. is ISO/IEC 27001:2022 certified. SII Certificate No. 1127825 (ANAB-accredited), IQNET registration IL-1127825, valid 23 Apr 2026 → 23 Apr 2029. Download SII certificate · Download IQNET attestation. See the Certifications section for the full scope and verification instructions.
SOC 2 Type II. The SOC 2 Type II audit is in flight. The engagement letter with our auditor has been signed and the observation period is underway. Download the letter of intent. The final SOC 2 Type II report will be available under MNDA on completion.
Privacy and data protection laws**
**Heyou’s privacy and security program is designed to support compliance with applicable privacy and data-protection obligations,.
12. Subprocessors ¶
Heyou uses a limited set of third-party subprocessors required to provide, operate, secure, support, and bill for the service.
| Subprocessor |
Purpose |
Typical Data Categories |
Status |
| Google Cloud Platform / Vertex AI |
Cloud hosting, infrastructure, storage, logging, monitoring, and approved AI processing through Vertex AI / Gemini |
Customer Data, service metadata, logs, prompts and outputs where AI processing is used |
Required for core service |
| Descope |
Identity, authentication, SSO, user management, and access-control workflows |
User account identifiers, authentication metadata, access-control metadata |
Required for authentication |
| Customer.io |
Customer communications, product notifications, lifecycle emails, and service-related messaging |
Business contact information, product-notification metadata |
Used for communications |
| Stripe |
Billing, subscription management, invoicing, and payment-related workflows |
Billing contact information, subscription and invoice metadata, payment-related records |
Used for billing |
| Attio |
CRM and customer relationship management |
Business contact information, account records, sales notes, commercial relationship data |
Business operations |
| Fathom |
Meeting recording, transcription, call summaries, and meeting intelligence for customer or prospect interactions, where used |
Meeting participant information, recordings, transcripts, summaries |
Used where meetings are recorded or summarized |
Heyou does not use subprocessors to create cross-customer datasets or use one customer’s data to benefit another customer.
Subprocessors that process customer data or personal data on Heyou’s behalf are governed by contractual data protection obligations, including confidentiality, security, and breach-notification commitments. Heyou provides customers with advance notice of material subprocessor changes in accordance with the DPA.
User-authorized third-party platforms that a user chooses to connect are not subprocessors of Heyou. Those platforms operate the user’s account independently and are governed by the user’s direct relationship with the platform.
13. Security Risk Mapping and Control Summary ¶
Heyou is designed around clear security boundaries: limited browser-extension permissions, tenant isolation, controlled AI processing, and strict limits on data reuse.
Extension supply-chain compromise**
**Publisher and release risk is mitigated through restricted access, secure publishing procedures, code review, limited extension permissions, and Manifest V3 extension controls. The extension does not request high-risk permissions such as cookies, debugger, or broad request-interception permissions.
Credential or session exposure**
**The extension is not designed to collect passwords, browser cookies, or reusable third-party session tokens. Activity occurs in the user’s active browser context, and Heyou’s backend does not receive credentials that would allow independent impersonation of the user.
Cross-tenant access**
**Heyou applies tenant isolation across application, database, and object-storage layers. Internal access is role-based, logged, and limited to approved operational purposes.
Third-party AI data exposure**
**Third-party AI processing is limited to approved providers. Heyou applies provider controls to prevent foundation-model training on customer data, uses region-aware processing where supported, and minimizes direct identifiers before model calls where identifiers are not required.
Improper data reuse or data-broker drift**
**Heyou does not sell customer data, create shared contact databases across customers, or use one customer’s relationship data to benefit another customer.
Subprocessor exposure**
**Heyou maintains a limited subprocessor list and requires contractual privacy and security commitments from subprocessors. Data shared with each subprocessor is limited to what is necessary for the applicable service purpose.
14. Privacy Rights, Suppression, and Incident Notification ¶
Subject to applicable law, individuals may have rights to access, correct, delete, port, restrict, or object to processing of their personal data. Where Heyou processes data as a processor on behalf of a customer, Heyou supports the customer in assessing and responding to those requests.
Heyou may maintain suppression mechanisms to help prevent re-introduction of individuals who validly object to processing or opt out, subject to applicable law and customer controller obligations. Where personal data remains in a customer source system, customers are responsible for removing or filtering the data at the source to prevent re-synchronization where required.
14.1 Incident Notification Commitments ¶
Heyou maintains an incident-response process designed to support timely investigation, escalation, customer notification, and regulatory coordination following a confirmed security incident involving customer data.
Where GDPR applies, Heyou supports notification without undue delay and, where applicable, within 72 hours of becoming aware of a qualifying personal data breach.
For incidents involving personal information subject to US state breach-notification laws, Heyou supports notification in the most expedient time possible and without unreasonable delay, consistent with applicable legal requirements, law-enforcement needs, and the time required to determine the scope of the incident and restore system integrity.
Heyou will notify affected customers without undue delay after confirming a security incident involving customer data. Notifications include available information reasonably needed to support the customer’s assessment, including the nature of the incident, affected data categories, impacted systems, containment actions, remediation steps, and recommended customer actions.
15. Customer Responsibilities ¶
Customers are responsible for configuring and using Heyou in accordance with applicable law, internal policies, and applicable third-party service requirements.
Customer responsibilities include:
- Establishing a valid legal basis for processing personal data through Heyou.
- Providing required notices to employees, prospects, customers, partners, and other relevant individuals.
- Completing DPIAs, LIAs, works-council consultations, or labor-law procedures where required.
- Configuring enabled source categories in accordance with internal policy.
- Choosing whether to enable, limit, pause, or disable user-authorized external-source access at the tenant level.
- Configuring source-system exclusions, deletion workflows, suppression handling, or source disablement needed to prevent re-introduction of data where required.
- Responding to third-party service notices, warnings, restrictions, or policy requirements by adjusting enabled sources where appropriate.
- Ensuring authorized users comply with customer policies and Heyou’s acceptable use requirements.
- Securing customer-side credentials, SSO configuration, API keys, and administrative access.
- Reviewing and validating AI outputs before acting on them.
- Honoring applicable data-subject requests and opt-outs.
Heyou provides documentation and implementation guidance to support customer assessments, but customers remain responsible for their own compliance obligations.
For security review, vulnerability disclosure, or trust-center access: