Compliance
Learn more about our built-in compliance layer
Kadoa provides robust and automated compliance features designed specifically for regulated or compliance-intensive organizations. Our compliance layer ensures that organizational guidelines and rules around data sourcing and extraction are automatically enforced.
Compliance Process
To operate Kadoa in a regulated environment, we recommend the following controls:
-
Compliance training: Ensure all authorized Kadoa users complete compliance training and understand your organization’s data sourcing policies.
-
Automated compliance checks: Leverage Kadoa’s built-in compliance layer to automatically enforce restrictions.
-
Regular reporting and auditing: Assign the compliance officer user role to enable regular auditing across teams.
Automated Compliance Rules
Your compliance team can configure automated checks tailored to your specific organizational requirements. Kadoa supports the following customizable compliance rules:
Rule Type | Description |
---|---|
Source Blacklisting | Explicitly prevent extracting or accessing prohibited sources or domains. |
Captcha & Explicit TOS Enforcement | Prevent automated circumvention of explicit Terms of Service pop-ups and automated Captcha bypassing. |
Sensitive Data (PII) Detection | Automatically detects attempts to extract common forms of Personally Identifiable Information (PII) and can be configured to redact, flag, or block such data. |
robots.txt Check | Automatically checks robots.txt directives for all web interactions, promoting ethical data sourcing from websites. |
Custom Restrictions | Configure fine-grained custom restrictions. |
Violations immediately trigger clear and descriptive warnings or errors, preventing accidental non-compliance.
We also allow you to add custom compliance hints/reminders on the screen where users configure a new workflow.
Auditing & Reporting
Kadoa maintains a full audit trail of compliance checks and their outcomes, ensuring complete visibility into your internal usage: Compliance officers with dedicated permissions can directly access platform-wide auditing and reporting.
Key information available in the downloadable compliance reports includes:
- Detailed records of all attempted or actual rule violations.
- Data sources accessed or attempted to be accessed.
- Timestamps for workflow runs (start, end, duration).
- User who created, modified, or triggered a workflow/agent.
- Version history and changes made to workflow configurations.
- Number of records or data points extracted.
- Originating IP addresses for requests.
- Status codes and responses from accessed sources.