Kadoa provides robust and automated compliance features designed specifically for regulated or compliance-intensive organizations. Our compliance layer ensures that organizational guidelines and rules around data sourcing and extraction are automatically enforced.

Compliance Process

To operate Kadoa in a regulated environment, we recommend the following controls:

  • Compliance training: Ensure all authorized Kadoa users complete compliance training and understand your organization’s data sourcing policies.

  • Automated compliance checks: Leverage Kadoa’s built-in compliance layer to automatically enforce restrictions.

  • Regular reporting and auditing: Assign the compliance officer user role to enable regular auditing across teams.

Automated Compliance Rules

Your compliance team can configure automated checks tailored to your specific organizational requirements. Kadoa supports the following customizable compliance rules:

Rule TypeDescription
Source BlacklistingExplicitly prevent extracting or accessing prohibited sources or domains.
Captcha & Explicit TOS EnforcementPrevent automated circumvention of explicit Terms of Service pop-ups and automated Captcha bypassing.
Sensitive Data (PII) DetectionAutomatically detects attempts to extract common forms of Personally Identifiable Information (PII) and can be configured to redact, flag, or block such data.
robots.txt CheckAutomatically checks robots.txt directives for all web interactions, promoting ethical data sourcing from websites.
Custom RestrictionsConfigure fine-grained custom restrictions.

Violations immediately trigger clear and descriptive warnings or errors, preventing accidental non-compliance.

We also allow you to add custom compliance hints/reminders on the screen where users configure a new workflow.

Auditing & Reporting

Kadoa maintains a full audit trail of compliance checks and their outcomes, ensuring complete visibility into your internal usage: Compliance officers with dedicated permissions can directly access platform-wide auditing and reporting.

Key information available in the downloadable compliance reports includes:

  • Detailed records of all attempted or actual rule violations.
  • Data sources accessed or attempted to be accessed.
  • Timestamps for workflow runs (start, end, duration).
  • User who created, modified, or triggered a workflow/agent.
  • Version history and changes made to workflow configurations.
  • Number of records or data points extracted.
  • Originating IP addresses for requests.
  • Status codes and responses from accessed sources.