Trust Center

How Heyou treats your data, your network, and your team.

Heyou is built on user-owned sources, employee network ownership, and view-oriented use. This page is the public version of the same governance pack we send legal and security reviewers under MNDA — the philosophy, the boundaries, the controls, and the documents.

The eight trust principles

How Heyou treats your data, your network, and your team.

Each principle is a stand-alone commitment. Click a card to jump to the supporting detail in the public trust overview below.

Ownership
User-owned sources
Employees control the professional sources they connect. Heyou doesn't treat employee-owned accounts as company-owned property.
Boundary
Two-tier data model
Organizational data sits in the tenant; personal-tier data sits at the user level. Admins never see personal-tier content unless the user affirmatively shares it.
Behavior
View-oriented by design
Heyou helps users understand relationships. It never auto-sends messages, connection requests, comments, likes, follows, posts, or profile changes.
Access
No credentials, no session tokens
Heyou does not collect passwords, third-party platform credentials, or reusable third-party session tokens. No login bypass; no access-control workarounds.
Conversations
Metadata only for messaging
For personal messages, Heyou processes participants, timestamps, and interaction frequency. Heyou never ingests the content of a personal message.
Minimization
Local transformation where practical
Where relationship intelligence can be derived from metadata or local transforms, Heyou prefers that over storing raw third-party source content.
Control
Customer-controlled source enable/disable
Customers decide which source categories are permitted in their tenant — and can pause or disable any source at any time, including user-authorized external sources.
AI
AI within customer boundaries
Heyou uses Gemini via Vertex AI with enterprise controls: no foundation-model training on Customer Data, region-aware processing, and PII minimization before model calls.
Certifications

ISO/IEC 27001:2022 certified. Verifiable, dated, downloadable.

Heyou Research and Development Ltd. maintains an ISO/IEC 27001:2022 Information Security Management System, audited by SII-QCD and recognized internationally through IQNET. The SOC 2 Type II audit is in flight — engagement letter signed and observation period underway; the letter of intent is available now and the final report will follow under MNDA.

Certified
ISO/IEC 27001:2022
Standards Institution of Israel (SII-QCD)
Certificate
1127825
SoA
01 Mar 2026
Valid
23 Apr 202623 Apr 2029
Accreditation
ANAB-accredited

Scope: Development and provision of a cloud platform for data processing to generate relationship-based engagement recommendations for humans and agents.

Download SII certificate (PDF)
Certified
ISO/IEC 27001:2022 — IQNET
IQNET (via SII)
Certificate
IL-1127825
Valid
23 Apr 202623 Apr 2029
Accreditation
Internationally recognized through the IQNET network

Scope: Same scope as the SII certificate. IQNET recognition lets non-Israeli reviewers verify the attestation against their own national IQNET member.

Download IQNET certificate (PDF)
In progress
SOC 2 Type II
AICPA Trust Services Criteria (Security, Availability, Confidentiality)

Scope: Examination of Heyou's controls relevant to security, availability, and confidentiality over an observation period, against the AICPA Trust Services Criteria. Audit engagement letter signed; observation in flight. The final SOC 2 Type II report will be available under MNDA on completion.

Download letter of intent (PDF)

To verify the SII certificate independently, scan the QR code on the PDF or look up certificate number 1127825 at sii.org.il. To verify the IQNET attestation, use registration number IL-1127825 against any IQNET member.

In this document
Heyou Whitepaper

User-Owned Sources and Responsible Relationship Intelligence

How Heyou activates relationship intelligence while respecting the boundaries between company-owned systems, employee-controlled sources, and personal professional context.

In this document
Public CISO Trust Overview

Public Trust Overview

What the CISO, Legal, and Privacy reviewer needs first — Heyou's data scope, control boundaries, AI posture, subprocessors, and incident commitments.

The document library

Public artifacts a reviewer can read without an NDA.

These are the contractual and policy documents that back the trust posture above. NDA-gated artifacts (SOC 2 report, pen-test summary, signed DPA copies) are available on request through the trust desk at security@heyou.com.

Terms of Service
LegalProcurement
Terms of Service
The commercial agreement that governs your use of Heyou — what we provide, what you provide, and how we handle data, AI, and disputes between us. Governed by Israeli law; venue in Tel Aviv.
Last updated: 2026-05-10
Privacy Policy
PrivacyLegalCISO
Privacy Policy
How Heyou treats personal data — including the two-tier model that separates organizational data from individual users' personal-tier connections, and what we do not do with either.
Last updated: 2026-05-10
DPA
PrivacyLegalCISO
Data Processing Addendum
The data-protection addendum that governs Heyou as a processor on your behalf, including GDPR-aligned obligations and a summary of our technical and organizational measures.
Last updated: 2026-05-10
Security Overview
CISOSecurity
Security Overview
The controls behind Heyou's product — tenant isolation, EU data residency, encryption, AI-call PII minimization, SSO/MFA, third-party penetration testing, and our incident-response posture.
Last updated: 2026-05-10
Responsible AI Policy
CISOLegalPrivacy
Responsible AI Policy
How Heyou's AI is built and constrained — Gemini via Vertex AI as the approved provider, no training on your data, PII minimization before model calls, and human-in-the-loop for every externally visible action.
Last updated: 2026-05-10
Acceptable Use Policy
LegalCISORevOps
Acceptable Use Policy
What you commit to when you use Heyou — no spam, no scraping, no high-stakes automated decisioning, and an obligation to honor opt-outs and meet local employee-monitoring requirements.
Last updated: 2026-05-10
Retention Schedule
PrivacyLegal
Data Retention and Deletion Schedule
How long Heyou keeps each category of data, and what triggers deletion. Customer admins can request earlier deletion; individual users control their personal-tier data.
Last updated: 2026-05-10
Subprocessor List
CISOPrivacyProcurement
Subprocessor List
The third-party services Heyou relies on. We don't use subprocessors to create cross-customer datasets.
Last updated: 2026-05-10
NDA-gated artifacts

Need the SOC 2 report, pen-test summary, or a signed DPA?

Some artifacts stay behind an MNDA. Email the trust desk and we'll send them the same day during business hours.

For incident reports, scoped questionnaires, or a redline on the standard DPA — same channel.