Terms and Policies
Effective Date: January 2026
Terms of Service
These Terms of Service ("Terms") govern access to and use of the Conway platform and services. By accessing or using our services, you agree to be bound by these Terms.
1. Definitions
"Authorized User" means your employees, consultants, contractors, and agents who are authorized to access and use the Platform under these Terms.
"Customer Data" means information, data, and other content submitted, posted, or transmitted by or on behalf of you or an Authorized User through the Platform. Customer Data does not include Usage Data.
"Documentation" means Conway's end user documentation relating to the Platform made available from time to time.
"Output" means content generated by the Platform based on Customer Data you provide.
"Platform" means Conway's proprietary hosted software platform, as made available to Authorized Users from time to time.
"Usage Data" means usage data collected and processed by Conway in connection with your use of the Platform, including activity logs, data used to optimize and maintain performance, and data used to investigate and prevent system abuse.
2. Access and Use
2.1 License Grant
Subject to your compliance with these Terms, Conway grants you a non-exclusive, non-transferable, non-sublicensable right to access and use the Platform during your subscription period for your internal business purposes. Each Authorized User must have a unique account. Account credentials may not be shared.
2.2 Use Restrictions
You shall not, and shall not permit any Authorized User to:
- Copy, modify, or create derivative works of any Conway intellectual property;
- Rent, lease, lend, sell, license, sublicense, assign, distribute, or transfer the Platform to any third party;
- Reverse engineer, disassemble, decompile, or attempt to derive source code from the Platform;
- Use the Platform for competitive analysis or to develop a competing product;
- Bypass or breach any security device or access the Platform other than through valid credentials;
- Upload unlawful content, malware, or content that infringes third-party rights;
- Use the Platform for life-critical applications, emergency services, or autonomous vehicles;
- Use Output to develop AI models that compete with Conway's products or services.
3. Ownership
3.1 Conway Intellectual Property
Conway owns all right, title, and interest in and to the Platform, Documentation, and all related intellectual property. Nothing in these Terms grants you any ownership rights in Conway's intellectual property.
3.2 Customer Data and Output
You retain all ownership rights in your Customer Data. To the extent permitted by applicable law, you own all Output generated for you. Output may not be unique; other users may receive similar content.
4. Fees and Payment
You shall pay all fees identified in your Order. Fees are non-refundable. If you pay via invoice, payment is due within thirty (30) calendar days. Late payments may incur interest at 1.5% per month. Conway may suspend access for non-payment.
5. Term and Termination
Your subscription begins on the effective date and continues for the period identified in your Order. Subscriptions automatically renew unless either party gives thirty (30) days written notice of non-renewal. Either party may terminate for material breach if the breach remains uncured thirty (30) days after written notice. Upon termination, you must cease use of the Platform and delete all Conway materials.
6. Warranties and Disclaimers
THE PLATFORM IS PROVIDED "AS IS." CONWAY DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT. CONWAY DOES NOT WARRANT THAT THE PLATFORM WILL BE UNINTERRUPTED, ERROR-FREE, OR SECURE.
7. Limitation of Liability
EXCEPT FOR GROSS NEGLIGENCE, FRAUD, WILLFUL MISCONDUCT, OR BREACH OF CONFIDENTIALITY OBLIGATIONS, NEITHER PARTY WILL BE LIABLE FOR CONSEQUENTIAL, INCIDENTAL, INDIRECT, EXEMPLARY, SPECIAL, OR PUNITIVE DAMAGES, INCLUDING LOST PROFITS OR LOSS OF DATA.
EACH PARTY'S TOTAL LIABILITY WILL NOT EXCEED THE AMOUNTS PAID TO CONWAY IN THE TWELVE (12) MONTHS PRECEDING THE CLAIM.
8. Indemnification
Conway Indemnification. Conway will defend, indemnify, and hold you harmless from third-party claims alleging that the Platform infringes such third party's intellectual property rights, provided you notify Conway promptly and allow Conway to control the defense.
Customer Indemnification. You will defend, indemnify, and hold Conway harmless from third-party claims arising from your Customer Data, your use of Output, or your unauthorized use of the Platform.
9. Governing Law and Jurisdiction
These Terms are governed by the laws of the State of California without regard to conflict of law principles. Any disputes must be brought in the state or federal courts located in San Francisco, California.
Data Use Policy
This Data Use Policy explains how Conway collects, uses, and protects data in connection with the Platform.
1. Customer Data
1.1 What We Collect
Customer Data includes any information, data, or content you or your Authorized Users submit through the Platform. You control what Customer Data you provide.
1.2 How We Use Customer Data
Conway uses Customer Data solely to:
- Provide you with the Platform and generate Output;
- Comply with applicable law; and
- Enforce Conway's policies.
Conway does not sell Customer Data. Conway does not share Customer Data for cross-context behavioral advertising. Conway does not use Customer Data outside the direct business relationship with you.
1.3 Ownership
You retain all ownership rights in your Customer Data. You grant Conway a license to use Customer Data solely to provide the Platform to you.
2. Usage Data
2.1 What We Collect
Usage Data includes:
- Diagnostic, performance, and usage information related to the Platform;
- Activity logs and metadata;
- Data used to identify source and destination of communications;
- Support inquiries and account administrator contact details.
2.2 How We Use Usage Data
Conway uses Usage Data to:
- Monitor, maintain, and optimize the Platform;
- Investigate and prevent system abuse;
- Conduct internal research and development;
- Create anonymized datasets for training or evaluation of services.
2.3 Ownership
Conway owns all Usage Data.
3. AI Technologies and Output
3.1 How AI Works
The Platform includes features powered by artificial intelligence. You provide Customer Data and receive Output based on that data.
3.2 Output Ownership
To the extent permitted by law, you own Output generated for you. However, Output may not be unique. Other users may receive similar content from the Platform, and such similar content is not considered your Output.
3.3 Output Limitations
You acknowledge that Output:
- May contain errors or misleading information;
- May perpetuate biases present in training data;
- May struggle with tasks requiring complex reasoning or judgment; and
- Is provided "AS IS" without warranties of any kind.
You are solely responsible for evaluating Output for accuracy and appropriateness, including by utilizing human review where appropriate.
4. Sensitive Data
You may not use the Platform to store or transmit Sensitive Data unless you have entered into a separate written agreement with Conway permitting such use. Sensitive Data includes:
- Protected health information (HIPAA);
- Payment card or financial account information;
- Social security numbers or government identification numbers;
- Children's data subject to COPPA; and
- Special categories of data under GDPR Article 9(1).
5. Data Retention and Deletion
Customer Data may be subject to storage limitations. Data exceeding these limitations may be automatically deleted. Upon termination or expiration of your subscription, Conway may delete all Customer Data. Upon request, Conway will provide a copy of your Customer Data in a commonly used format or provide self-service functionality to download such data.
6. Sub-processors
Conway uses the following sub-processors to provide the Platform:
| Provider | Purpose |
|---|---|
| AWS | Embedding model endpoints and compute infrastructure |
| PlanetScale | Log persistence |
| WorkOS | Authentication |
| Anthropic | Foundation model calls |
Conway will provide at least fifteen (15) days' notice of any changes to sub-processors. You may object to a new sub-processor within fifteen (15) days of notice.
7. International Data Transfers
Conway may process Customer Data anywhere Conway or its sub-processors maintain facilities. For transfers from the EEA, UK, or Switzerland, Conway relies on Standard Contractual Clauses approved by the European Commission.
Security
Conway is committed to protecting the security, confidentiality, and integrity of the Platform and Customer Data. This section summarizes our security practices.
1. Organizational Security
1.1 Security Leadership
Conway has designated a Chief Information Security Officer (CISO) responsible for establishing and maintaining our security strategy, policies, and program. Security considerations are integrated at the highest level of decision-making.
1.2 Security Governance
Our Board of Directors and Risk and Governance Executive Committee provide oversight of security and compliance. An Information Technology Leadership Committee meets monthly to review security issues and take corrective action as necessary.
1.3 Policies and Procedures
Conway maintains comprehensive security policies covering access control, data classification, incident response, change management, network security, vendor management, and business continuity. Policies are reviewed and updated at least annually.
2. Personnel Security
2.1 Background Checks
All employees and contractors complete background checks prior to joining. Results are reviewed in accordance with local laws.
2.2 Confidentiality Agreements
All personnel sign confidentiality agreements before accessing sensitive information.
2.3 Security Training
Employees complete security awareness training upon hire and at least annually. Training covers secure coding practices, data handling, incident reporting, and emerging threats.
3. Access Controls
3.1 Least Privilege
Conway adheres to the principle of least privilege. Users are granted access only to the systems and data necessary for their job functions. Administrative access to production systems is restricted to authorized personnel.
3.2 Authentication
Multi-factor authentication (MFA) is enforced for administrative access to production systems, email, version control, and cloud infrastructure. Passwords must be at least eight characters and complex.
3.3 Access Reviews
Access privileges for high-risk and critical systems are reviewed at least quarterly. Access is revoked within one business day upon termination.
4. Data Protection
4.1 Encryption
Customer Data is encrypted in transit using TLS 1.2 or higher over public networks. Data at rest is encrypted using industry-standard encryption technologies. Encryption keys are managed through our cloud provider's key management service.
4.2 Data Classification
Conway classifies data into four tiers (Public, Internal, Confidential, Restricted) with corresponding handling requirements. Customer Data is classified as Confidential or Restricted and handled accordingly.
4.3 Data Loss Prevention
Conway uses data loss prevention (DLP) software to prevent sensitive information from being transmitted inappropriately.
5. Infrastructure Security
5.1 Cloud Hosting
Production systems are hosted in cloud environments with physical security controls managed by our cloud provider. We review our cloud provider's SOC 2 report annually.
5.2 Network Security
Networks are protected by firewalls and intrusion detection systems. Traffic is explicitly blocked except for business-required protocols. Development, production, and corporate environments are logically separated.
5.3 Endpoint Security
Anti-virus and malware protection software is installed on all production servers and configured to scan continuously. Endpoint devices are managed through mobile device management (MDM) software with enforced security policies.
6. Vulnerability Management
Conway conducts vulnerability scans monthly on infrastructure and applications. Critical and high vulnerabilities are remediated promptly. Security patches are applied according to a documented schedule, with critical patches applied as soon as possible.
7. Logging and Monitoring
Conway collects and monitors audit logs from production systems, applications, databases, and critical services. Logs include administrative activities, logon attempts, data deletions, and security configuration changes. Logs are securely stored for a minimum of one year and protected against unauthorized access.
8. Incident Response
Conway maintains a formal incident response plan that defines responsibilities, detection, and corrective actions. The plan is tested and reviewed at least annually.
Security Incident Notification
Conway will notify you without undue delay after becoming aware of a security incident affecting your Customer Data. Notifications will include the nature of the incident, measures taken to mitigate and contain the incident, and the status of the investigation.
All security incidents are logged, tracked, and communicated to affected parties. Post-incident reviews evaluate root causes and lessons learned.
9. Business Continuity and Disaster Recovery
Conway maintains business continuity and disaster recovery plans for critical operations. Cloud environments are distributed across different availability zones for redundancy. Backups are performed at least weekly and replicated to a different availability zone. Backup restoration is tested annually.
10. Vendor Management
Conway performs security assessments on third-party vendors before engagement. Assessments may include review of SOC 2, ISO 27001, or other compliance evidence. Critical vendors are reviewed annually for continued compliance with security requirements.
11. Risk Management
Conway conducts formal risk assessments at least annually. Assessments identify threats, vulnerabilities, and potential impacts. Identified risks are documented in a risk register with mitigation strategies and tracked to resolution.
12. Audit and Compliance
Compliance Certifications
Conway maintains compliance certifications and undergoes independent audits. Customers may request copies of relevant compliance certifications and audit reports.
Customer Audits
Customers may audit Conway's compliance with security commitments annually upon reasonable written notice, during normal business hours, and in a manner that does not materially disrupt operations. Where a recent certification or SOC 2 report addresses the audit scope, Conway may provide this documentation in lieu of a physical audit.
13. Security Contact
To report a security concern or request information about our security program, contact: team@conway.ai
Conway Enterprises, Inc.
Questions? Contact legal@conway.ai