GDPR governance, AI regulation alignment, subprocessor transparency, and operational traceability.
366 is operated in alignment with the principles of the General Data Protection Regulation (GDPR).
Roles and responsibilities are clearly defined:
Data Controller
The Customer
For the data it uploads and processes within the platform
Data Processor
SCRIPTOR-ARTIS SAS (operator of 366)
In accordance with applicable contractual provisions
A Data Processing Agreement (DPA) is available to govern:
366 may rely on:
Infrastructure providers act as subprocessors for hosting, storage, and compute services required for the operation of 366.
Where AI models are provided by SCRIPTOR-ARTIS SAS, relevant third-party AI model providers act as subprocessors for the execution of inference requests initiated by the customer.
Where a customer configures its own external AI provider (e.g., via its own API credentials), such provider acts under the customer's responsibility and contractual framework.
Where certain providers operate outside the European Union, appropriate contractual safeguards are implemented in accordance with GDPR requirements.
366 is designed to align with emerging regulatory requirements under the EU AI Act.
As a provider of professional AI systems, 366:
Customers remain responsible for ensuring that their specific use cases comply with applicable regulatory obligations.
366 governance incorporates operational resilience principles, including:
Detailed documentation may be shared under NDA where appropriate.
366 integrates:
The official support portal, TyR™, serves as the centralized ticketing and traceability platform for customer requests and incident management.
Customer Support Portal (TyR)The following documentation is available upon request under NDA:
Full Data Processing Agreement (DPA)
Complete contractual framework for data processing
Subprocessor List
Current list of authorized subprocessors and their roles
AI Regulatory Documentation
EU AI Act alignment documentation and quality management
Detailed Security Procedures
Access control, encryption, and vulnerability management
Governance & Update Commitments
Update cycles, security governance, and compliance roadmap
Request access under NDA
Available to customers, prospects in evaluation, and auditors. We typically respond within 48 hours.