Back

AI Use Addendum

We care about responsible AI. This addendum explains how Scalient’s AI features work, the limits of automation, and how you are expected to use them safely and ethically.

Last updated

January 30, 2026

1. AI Limitations

AI-generated content may be:

  • Inaccurate

  • Outdated

  • Inappropriate for specific contexts

You acknowledge and accept these risks. AI is not a substitute for human judgment.

2. Human Oversight

You are responsible for:

  • Reviewing AI-generated content before using it

  • Ensuring compliance with marketing laws, consent requirements, and customer privacy laws

3. Use Cases

Approved uses include:

  • Lead intake and triaging

  • Appointment setting

  • Customer routing

  • FAQ responses

You may not use our AI for:

  • Legal, medical, or financial advice

  • High-risk use without oversight

  • Deceptive sales tactics

Data Processing Addendum (DPA)

This DPA is incorporated into the Terms to comply with data protection obligations.

1. Roles

Role

Party

Data Controller

Client

Data Processor

Scalient

2. Purpose of Processing

To deliver AI-powered services on the Client’s behalf, including:

  • Call handling

  • Data collection

  • Workflow automation

3. Data Types

  • Business contact info

  • Call recordings (optional)

  • Customer booking data

  • CRM notes or logs

4. Security Measures

Scalient agrees to implement:

  • Encryption at rest and in transit

  • Role-based access controls

  • Secure API authentication

  • Data retention policies

5. Subprocessors

We use third-party providers (e.g., Stripe, Twilio) as subprocessors. A full list is available upon request.

You authorize these subprocessors by using our services.

6. Data Subject Requests

We will assist you in responding to:

  • Deletion requests

  • Corrections

  • Access requests

7. Breach Notification

We will notify you of any confirmed data breach involving your data within 72 hours.

8. International Transfers

Data may be processed in other jurisdictions. We use standard contractual clauses and secure hosting.