Frequently asked questions

Curious about AI?

Here are the key answers to our AI solutions.

How long does it take to implement the AI solution?

Depending on the product and complexity, the first AI-Helpers are ready for use in a few minutes to a few days — depending on the desired depth and system connection.

Which systems can be connected (e.g. CRM, ERP, DMS)?

We already have numerous connectors and interfaces to existing systems. Depending on requirements, the connection is made via API, SFTP or webhooks.

How much IT know-how is required for use?

None Thanks to our no-code platform, you can create and customize AI assistants yourself without programming knowledge.

Are the solutions GDPR and AI-ACT compliant?

Yes, all processes comply with the highest European data protection and security standards — including role-based access, encryption and data sovereignty.

Where is my data stored?

All data is stored exclusively within Germany and the EU. Processing in third countries does not take place.

Can existing processes (e.g. appointments, claims reports) be automated?

Yes Using ready-made templates and our no-code platform, you can map typical processes directly or individually configure your own dialogs.

Does AI use our data for AI training?

No Your data will not be used for training. Our AI models are fully trained and process your data exclusively at runtime.

Which channels does the platform support?

You can use our solution for telephone, chat, e-mail and internal assistance — everything can be controlled and combined centrally.

How is the handover to human employees carried out?

In the no-code platform, transfers can be individually designed, e.g. via forwarding, message or structured handover ticket.

Questions about our
AI-Helpers

How do internal communication tools support employees?

Our internal communication tools act as digital assistants equipped with advanced AI technology. They support employees by making work processes more efficient and increasing productivity.

How is data protection ensured with internal tools?

We ensure that our internal communication tools strictly comply with company policies and current data protection laws to ensure comprehensive protection of sensitive information.

How is integration into our internal systems carried out?

Our tools are specifically designed to enable seamless and easy integration with your existing internal systems, making it easy and efficient to integrate them into your existing infrastructure.

How are access rights for internal tools managed?

Access rights are controlled centrally via your existing administration systems.

How long does it take to implement internal communication tools?

Our internal communication tools are implemented quickly and efficiently, and can usually be completed within a few days, depending on your company's specific requirements and existing infrastructure.

What types of information can internal communication tools process?

Our tools are flexible and can effectively process both unstructured and structured business information, covering a wide range of data formats and types.

Are your internal communication tools scalable?

Our internal communication tools are specifically designed for scalability. They adapt flexibly to the growth and changing needs of your business to ensure continuous and efficient support.

How user-friendly are the internal communication tools?

Our internal tools are intuitively designed and do not require any previous technical knowledge.

Can the internal tools be adapted to my specific business needs?

Yes, our tools offer comprehensive adaptability to specifically address the unique requirements of your company and enable optimal integration into your processes.

Is there support and training available for the introduction of internal communication tools?

We offer a comprehensive onboarding program that consists of training, documentation, and personal assistance.

Where is the data from your internal communication tools stored?

The data from our internal communication tools is stored on secure ISO-certified servers in Europe as standard. For customers who prefer local storage, we offer the option of running the platform on their own servers. This allows individual adjustment to specific security and data protection requirements.

Privacy & security

Is the solution compliant with GDPR and AI Act?

Yes Our AI solutions are fully GDPR-compliant. We established most of the requirements of the upcoming EU AI Act — such as the clear identification of AI systems, regular user training and responsible handling of sensitive data — as a standard even before it was created. In particular, the mandatory classification of our AI applications in a risk class has been added. Here, they are classified as minimal or low risk, depending on the specific application. In close coordination with leading German data protection experts, we are constantly monitoring all legal developments and are continuously adapting our processes so that you can always rely on a solution that complies with laws and regulations and ensures secure and legally compliant operation.

Where is the data hosted and processed?

Our AI agent platform — the central core of all Bots4You AI solutions — is operated exclusively in the Open Telekom Cloud in German data centers. There are particularly high security and data protection requirements, which are fully implemented in accordance with GDPR. Should subcontractors (sub-service providers) be involved in addition, they are based in the EU and are subject to the same strict European data protection standards. Processing outside the EU does not take place, meaning that all data remains under European sovereignty and is reliably protected against access from unsafe third countries.

How is encryption implemented?

We consistently use modern encryption methods to protect your data. TLS/HTTPS is used to transfer all data — meaning that all connections are encrypted using the latest protocols. During rest (storage), your data is also encrypted using the state of the art (e.g. using AES-256). Key management is carried out securely and only by us. This ensures that your information is optimally protected at all times, both during transport and storage.

What role and rights management functions are there?

Our platform has fine-grained role and rights management. You can define various user roles with individual access rights for your organization. For example, you can determine exactly which employees are allowed to access which data or functions. As a result, confidential information remains strictly accessible only to authorized persons. This principle of minimal assignment of rights ensures that each user can only see and do what is necessary for his/her task.

Will my data be shared, mixed or used for model training?

No Your data belongs exclusively to you and is neither passed on nor mixed with other customers. Each customer instance is strictly separated from others (multi-tenancy). We do not share any data between different customers or user accounts — this applies to uploaded documents as well as to all chat and voice sessions. Your data is also not used to train our AI models. AI components only process your inputs to deliver the desired results and don't store them permanently.

What security certifications are available?

Our cloud infrastructure meets recognized security certifications. For example, our data center operation is certified in accordance with ISO/IEC 27001 and tested in accordance with the BSI C5 catalog of requirements. The Open Telekom Cloud also has other certificates and reports such as SOC 1/2/3 and TISAX (Level 3) for automotive safety. In addition, our AI agent platform has been awarded the “Software Made in Germany” seal, and we are a certified member of the Federal AI Association. Through regular external audits, we ensure that we meet the highest safety standards. Industry-specific requirements — such as the financial supervisory authority (BaFin) and new regulations such as DORA for the financial sector — are also met. In short, you can trust that our platform is demonstrably secure and tested.

How does user and rights management work?

We offer intuitive user management that allows you to centrally control all users and permissions. Administrators can create or remove new user accounts and fine-tune who can see or use which functions and data. As a result, you always have full control over which people have access to which information. The allocation of rights can also be organized at team or department level. In this way, we ensure that your internal authorization concept is optimally represented and that unauthorized persons do not have access.

Will all data be stored in Germany?

The central storage location for your data is the Open Telekom Cloud in Magdeburg. When we use external sub-service providers, no data is stored there permanently outside our system. Should selected sub-service providers be used for specific processing operations, this is done exclusively under our control and within the EU. Permanent external data storage by third parties is excluded. Your internal company information is stored on the basis of a deletion concept agreed with you. This allows you to retain data sovereignty and benefit from German data protection standards.

Is there an AV contract and where can I find the sub-service providers?

We have already integrated an order processing agreement (AVV) in accordance with Art. 28 GDPR into our terms and conditions. This means that you no longer have to conclude a separate AV contract — the required data protection agreements apply automatically when using our service. All sub-service providers we use are also transparently listed in this AVV. You can therefore see at any time which subcontractors we use to provide services.