Easygenerator’s Auto-Translation, EasyTranslate, feature enables users to translate learning content into multiple languages while maintaining strong security, privacy, and data protection controls.
Architecture and Processing
The Auto-Translation feature uses enterprise-grade AI language services to process user-provided text for translation. Content is transmitted securely to the AI service solely for the purpose of generating translations and returned to Easygenerator once processing is complete.
Data Protection and Privacy
Encryption: All data is encrypted in transit using TLS 1.2+ and encrypted at rest using AES-256 within Easygenerator’s systems.
Data minimization: Only the text required for translation is processed; no unnecessary metadata is shared.
No training on customer data: Customer content submitted for translation is not used to train or improve AI models, in line with enterprise contractual commitments.
Retention controls: Translation data is retained only as needed to provide the service and is not stored by the AI provider beyond processing.
Access Control and Tenant Isolation
Role-based access controls restrict who can initiate translations within a workspace.
Translation processing occurs within logically segregated tenant environments, preventing cross-customer data access.
Accuracy, Quality, and Human Oversight
Translations are provided as assistive outputs and require user review before publication.
Users remain in control to edit, accept, or reject translated content.
Monitoring and Abuse Prevention
Automated monitoring and moderation controls are in place to detect misuse, anomalous behavior, or policy violations.
Logging and alerting support incident detection and investigation.
Third-Party Risk Management
AI service providers used for translation are subject to Easygenerator’s vendor risk assessment process, including security and privacy reviews.
Providers are required to meet industry-standard security practices.
Business Continuity and Resilience
The platform includes monitoring, fallback workflows, and incident response procedures to ensure continuity in case of service disruption.
