Privacy Policy
Jurisdiction: Commonwealth of Australia  ·  Governing law: Privacy Act 1988 (Cth)

Introduction

Totii.ai is a role-based conversational assistant — a private platform where organisations and individuals turn their own knowledge, documents, voice, and style into a superstar colleague that can be talked to through chat, voice, or a cloned avatar. This policy explains how personal information is handled across every way the platform is used.

We have written this policy to be readable without legal training. If you represent an organisation reviewing Totii for procurement or a cyber-security assessment, our full technical privacy and security documentation — including data-flow diagrams, encryption specifications, and independent certifications — is available on request.

1. Who we are

Totii.ai is owned and operated by two Australian-incorporated companies working in partnership. Both are bound by the Privacy Act 1988 (Cth) and the Australian Privacy Principles (APPs).

Mr and Mrs Cloud Pty Ltd — Platform Owner and Data Controller
ABN 77 613 464 136  ·  Australia
Owns the Totii.ai brand and service. Determines the purposes and means of processing for the platform overall.

Shine Me Pty Limited — Technology Partner and Data Processor
ABN 22 688 961 257  ·  ACN 688 961 257
Specialist technology partner in artificial intelligence and cloud solutions. Engineers, operates, and maintains the Totii platform on behalf of Mr and Mrs Cloud Pty Ltd.

Throughout this policy, “Totii”“we”“us”, and “our” refer collectively to Mr and Mrs Cloud Pty Ltd and Shine Me Pty Limited, acting in their respective capacities. Both companies share responsibility for this policy and the protection of personal information.

2. Who this policy applies to

Totii is used in four distinct ways. This policy covers every one of them.

  • Totii for Enterprises — Organisations with business units, departments, teams, and roles. Private company knowledge platform with role-based access control.
  • Totii for Small Business — Town planners, accountants, consultants, medical practices, and other professionals. Role-based assistants that handle client intake, appointment scheduling, document workflows, and professional communications.
  • Totii for Communities — Cultural associations, neighbourhood groups, service clubs, member organisations. Private community hubs where members find events, professional directories, and community leaders through one-to-one private conversation.
  • Totii for Individuals — Parents, grandparents, mentors, and anyone preserving personal wisdom. Personal legacy platform where individuals capture their stories, voice, and guidance for family and chosen recipients in Living Mode or Legacy Mode.

This policy also applies to visitors of the Totii.ai website, anyone who contacts us through sales, support, or general enquiries, and anyone whose personal information is shared with us by an organisation using Totii.

3. Controller and processor roles

Totii’s role under privacy law depends on how the platform is being used. This matters, because it tells you who is responsible for which decisions.

How Totii is usedOur roleThe controller is
Enterprise, small business, or community deploymentData processorThe customer organisation. They decide what personal information is uploaded and who can access it. We process it on their instructions under a written agreement.
Individual legacy accountData controller (joint with the individual)You, the individual account holder. You upload your content, you choose the recipients, you set the privacy tiers. We apply your rules and keep your data secure.
Totii.ai marketing website and general enquiriesData controllerMr and Mrs Cloud Pty Ltd. We decide what information is collected when you visit our website or contact us.
End-user interactions (e.g. a client chatting with a small-business avatar)Data processorThe deploying organisation. They have their own privacy notice covering that interaction, and we process chat content on their instructions.

Important: If you are interacting with a Totii-powered assistant that has been white-labelled or deployed by another organisation (for example, “Ask [YourCompany]”), that organisation’s own privacy notice governs that interaction. We handle your information on their behalf. This policy explains the overall platform; the deploying organisation explains their specific use.

Purpose (Abbreviated) Description Legal Ground
Providing the Services Process data to deliver avatar deployment and management Necessary to perform the Terms
Communicating with You Respond to inquiries or send account updates Necessary to perform the Terms
Billing Handle payments for subscriptions Necessary to perform the Terms
Preventing Fraud Protect against fraud and misuse Legitimate interest with consent
Safety Safeguard platform and ensure safety Legitimate interest
Understanding Usage Analyze trends and improve services Legitimate interest
Administrative and Legal Address legal issues or enforce contracts Legal obligation or legitimate interest
Compliance Meet legal or regulatory requirements Legal obligation
Research and Development Enhance avatar models Legitimate interest with opt-out
Verify Identity Prevent fraud with consent Explicit consent (withdrawable)

4. Our privacy principles

Totii is engineered around six non-negotiable principles:

  1. Your data stays yours. Customer content is never sold, never shared, never used to train AI models, and never disclosed beyond what this policy describes.
  2. Privacy by design. Access controls, data minimisation, and least-privilege defaults are built into the platform. You opt into data collection, not out of it.
  3. Local deployment. In its default Australian configuration, the platform runs inside Australian data centres. Where customers require a different jurisdiction, we deploy in the region they nominate.
  4. Role-based access, enforced automatically. Totii checks the requester’s role, department, and permissions on every query. People see only what they are authorised to see.
  5. Consent for voice and likeness. Voice clones, avatars, and cloned personas are created only with explicit, revocable, written consent from the person being cloned.
  6. Transparency. We tell you what we collect, why, where it goes, how long we keep it, and who touches it — in plain language.

5. Information we collect

The information Totii handles falls into the categories below. What actually applies to you depends on how you are using the platform.

Account and business-contact information

When you sign up, book a demo, or contact us, we collect name, job title, organisation, email address, phone number, and the content of your enquiry.

Customer-uploaded content (“Your Brain”)

When an organisation or individual builds their Totii, they upload knowledge that Totii draws on to answer questions. Depending on the use case, this may include:

  • Enterprise: policies, handbooks, procedures, playbooks, project specifications, meeting notes, technical documentation, organisational charts, role definitions, and access policies.
  • Small business: client records, case files, templates, pricing, service descriptions, FAQs, scripts, calendars, and practice-management data.
  • Community: event details, professional directory listings with verified credentials, community-leader profiles, membership information, and community resources.
  • Individual: personal stories, letters, journals, photos, videos, guided-prompt responses, audio and video recordings, and designated recipient lists.

This content belongs to the customer who uploads it. We hold it, secure it, and make it searchable — we do not use it for any purpose other than delivering the service.

Conversation content

The questions users ask and the responses Totii returns. Kept only as long as the service requires — see Section 12.

Voice, video, and likeness data (opt-in only)

Where a customer chooses to create a voice clone or avatar, we process voice recordings, photographs, and video provided by the person being cloned. This is covered in detail in Section 9.

Access-control metadata

Roles, departments, permissions, identity verifications (especially for family-tier access in Individual accounts), and a log of access attempts. This is how Totii decides who can see what, and how it demonstrates to the customer’s auditors that the rules were followed.

Technical and operational data

IP address (truncated where practical), browser type, device category, language preference, request timestamps, error logs, and performance telemetry. Used for security, reliability, abuse prevention, and audit.

Integration data

Where a customer connects third-party services (for example, Google Drive or Salesforce), we receive only the data the customer has authorised the integration to share, and only for the purpose of answering that customer’s queries. See Section 8.

Conversation summaries and shareable access

For small-business customers, Totii can auto-generate email or SMS conversation summaries and provide shareable URLs or QR codes for clients. Recipients of those summaries or URLs are subject to the sending customer’s privacy notice; we process the delivery on the customer’s behalf.

6. How we use the information

We use personal information only for the purposes set out below. We do not repurpose it without fresh consent or a clear legal basis.

  • To operate the service. Delivering chat, voice, and avatar interactions. Searching the customer’s knowledge base. Generating responses. Enforcing role-based access. Producing conversation summaries.
  • To keep the platform safe. Detecting abuse, enforcing rate limits, identifying security incidents, preventing unauthorised access, and meeting our obligations under the Notifiable Data Breaches scheme.
  • To improve reliability. Aggregated, de-identified operational metrics — never conversation content — are used to make the platform faster and more reliable.
  • To support you. Responding to your enquiries, running demonstrations, onboarding your organisation, and providing ongoing support.
  • To manage the business. Billing, contract administration, and relationship management.
  • To meet legal obligations. Responding to lawful requests from Australian regulators, courts, or law enforcement, and meeting our tax, corporate, and audit obligations.

What we will never do. We do not sell personal information. We do not share personal information with advertisers. We do not build behavioural profiles. We do not use your content to train our AI models or anyone else’s. These are absolute commitments, not preferences.

7. Who we share information with

We disclose personal information only to the parties listed below, and only to the extent necessary for their role.

Infrastructure and cloud providers

Totii runs on enterprise cloud infrastructure (primarily Microsoft Azure, with the option to deploy on AWS, Google Cloud, or customer-owned infrastructure where required). These providers act as our sub-processors and are contractually bound by confidentiality and security obligations. Australian deployments use regions that are IRAP-assessed at PROTECTED level.

AI model providers

We use AI models from reputable enterprise providers (including Google and Anthropic), accessed through enterprise-grade managed services. All model providers are contractually bound not to train their models on our customer content.

Avatar-rendering partner

Where a customer enables avatar mode, we work with a specialist real-time avatar-rendering partner to deliver the live video and voice experience. This partner is SOC 2 Type 2 certified, GDPR-aligned, and independently audited. Voice streams pass through the partner in real time for speech processing; they are not stored after the session ends. We are happy to disclose the specific partner and their certifications to customers as part of a procurement or security review, under non-disclosure.

Delivery providers

Email and SMS summaries are sent through reputable transactional-messaging providers under contract. Content is transmitted for delivery only and not used for any other purpose.

Professional advisers

Our accountants, auditors, and legal advisers may access personal information where strictly necessary, under professional confidentiality obligations.

Regulators and law enforcement

We will disclose personal information where required by Australian law, including in response to a valid subpoena, court order, or regulatory request from the Office of the Australian Information Commissioner (OAIC).

Successors in a business transaction

If Mr and Mrs Cloud Pty Ltd is sold, merged, or restructured, personal information may transfer to the successor entity, subject to this policy continuing to apply or being replaced with a policy that provides equivalent protection.

8. Third-party integrations

Totii can connect to third-party services to bring your existing knowledge into your Brain. Integrations are always opt-in, configured by the customer, and authorised through the third party’s own consent flow (typically OAuth).

Commonly supported integrations include:

  • Document and knowledge sources: Google Drive, Microsoft OneDrive, SharePoint, Confluence, Notion
  • Customer and sales platforms: Salesforce, HubSpot
  • Project and task management: Jira, Asana
  • Calendar and scheduling: Google Calendar, Calendly
  • Marketing and email: Mailchimp
  • Custom APIs: where a customer wishes to connect a bespoke internal system

For each integration:

  • We request only the scopes necessary for the feature the customer has enabled
  • We respect the permissions already in the source system — if a user cannot see a document in the source, Totii will not surface it either
  • The customer can revoke any integration at any time, either in Totii or in the third-party service
  • We do not replicate or store content from integrated systems beyond what is required to answer queries and keep the index in sync

Each third-party service has its own privacy policy, which governs how that service handles your data once it is inside it. We recommend customers review those policies before enabling an integration.

9. Voice cloning and avatar likeness

  • Some Totii deployments include a cloned voice, avatar, or persona of a specific real person. Because this involves biometric-style data and the right to one’s own image and voice, we apply heightened controls.

    • Written consent. Voice, face, and likeness data is captured only with a signed consent and licensing agreement from the person being cloned. The agreement defines the permitted scope of use.
    • Revocable. Consent can be withdrawn at any time. On withdrawal, we destroy the voice model, facial model, and any associated biometric data within the timeframe specified in the agreement (ordinarily within 30 days).
    • Review and approval. The cloned person reviews and approves the voice, avatar, and persona behaviour before any end user interacts with it.
    • No onward use. Cloned voice and likeness data is never used for any purpose outside the deployment it was created for. It is never shared with advertisers, never licensed to third parties, and never used for model training.
    • Deceased persons. Where a clone continues after the person’s death (for example, in a legacy deployment), it operates under the original consent and the instructions of the estate or designated executor as documented in the account settings.

10. Cross-border data transfers

For Australian customers using the platform in its default configuration, all data remains within Australian data centres — with one narrow exception. Where avatar mode is enabled, the live audio stream passes through our avatar-rendering partner in real time for speech processing. It is transmitted over encrypted WebRTC, processed on the fly, and not stored. No identifying information is attached to the stream beyond what the customer has chosen to collect.

Where a customer has chosen a non-Australian deployment region, data is handled in that region under the same principles.

Cross-border disclosures are made in accordance with Australian Privacy Principle 8. Before disclosing personal information overseas, we take reasonable steps to ensure the recipient does not breach the APPs in relation to that information, through a combination of:

  • Written data-processing agreements imposing APP-equivalent obligations
  • Independent certifications (SOC 2 Type 2, ISO 27001, GDPR, and equivalents)
  • Technical controls (encryption, no storage, pass-through-only processing)

11. How we protect information

Security is engineered into the platform at every layer. Key controls include:

  • Encryption in transit. TLS 1.2 or higher on every connection. WebRTC streams encrypted with DTLS/SRTP.
  • Encryption at rest. AES-256 on all stored data. Secrets held in hardware-security-module-backed key vaults.
  • Identity and access. Multi-factor authentication on all administrative accounts. Role-based access control at every layer. Managed identity for service-to-service authentication, removing embedded credentials.
  • Automatic access enforcement. Every query is checked against the requester’s role, department, and permission tier. Totii silently declines anything the requester is not authorised to see, and logs the attempt.
  • Network controls. Web application firewall, DDoS protection, network security groups, and private endpoints where supported.
  • Continuous monitoring. SIEM tooling, anomaly detection, vulnerability scanning, and a documented incident response process.
  • AI safety controls. Maximum safety filters, locked system prompts that end users cannot override, rate limiting, and off-topic redirection.
  • Auditability. Every infrastructure change, every administrative action, every access attempt — logged and retained for review.

No security control is perfect, and we do not claim otherwise. We are committed to the Notifiable Data Breaches scheme under Part IIIC of the Privacy Act 1988, and will notify affected individuals and the OAIC where required.

12. How long we keep information

We retain personal information only for as long as it is needed, or for as long as the law requires.

Information typeRetention period
Customer-uploaded content (the Brain)For the duration of the customer’s active account. On termination, returned to the customer on request and then destroyed, ordinarily within 30 days.
Conversation transcripts (where storage is enabled)For the period the customer has configured. Default: 90 days.
Conversation context (where storage is disabled)Cleared at session end. Never written to permanent storage.
Voice and likeness modelsFor the term of the consent and licensing agreement. Destroyed on withdrawal of consent, ordinarily within 30 days.
Access logs and security audit records12 months minimum, or longer where required by contract or law.
Business contact informationFor the duration of the customer relationship, plus seven years for tax and corporate record-keeping obligations.
Legacy-mode content (Individuals)For as long as the account is funded and active, and per the instructions left by the account holder for their estate.

13. Your rights under the Australian Privacy Principles

If we hold personal information about you, you have the following rights under the Privacy Act 1988:

  • Access. You may ask what personal information we hold about you and receive a copy (APP 12).
  • Correction. You may ask us to correct personal information that is inaccurate, out of date, incomplete, irrelevant, or misleading (APP 13).
  • Deletion. You may ask us to delete personal information where it is no longer required for the purpose it was collected, subject to our legal and contractual retention obligations.
  • Complaint. You may complain to us about any suspected breach of the APPs.
  • Withdraw consent. Where processing depends on your consent (for example, voice cloning), you may withdraw it at any time. Withdrawal is effective going forward.
  • Anonymity or pseudonymity. Where it is lawful and practicable, you may interact with us without identifying yourself (APP 2).

To exercise any of these rights, contact us using the details in Section 19. We aim to respond within 30 days.

If your personal information is held on our behalf of a customer: Where we hold information about you as a processor on behalf of an organisation (for example, because you are an employee of a Totii-using enterprise, or a client of a small business that uses Totii), please direct access and correction requests to that organisation first. They are the data controller for that information. We will assist them in responding to your request.

14. Totii for Individuals: Living Mode and Legacy Mode

Totii for Individuals is a deeply personal product. It holds the stories, voice, and guidance an account holder wants their family and chosen recipients to be able to access — now and, if they choose, after their death. Because of the sensitivity of this data, additional protections apply.

Privacy tiers you control

Every piece of content you upload can be tagged at one of four tiers: PublicFamilyInner Circle, or Secret (named individuals only). Totii enforces these tiers automatically on every query. You can change a tier at any time while you are alive.

Identity verification of recipients

For Family, Inner Circle, and Secret tiers, invited recipients must verify their identity before accessing content. We retain only what is necessary to demonstrate that verification happened — we do not collect more identity data than we need.

Living Mode

While you are alive, you control everything — adding content, revising content, changing tiers, inviting or removing recipients, and deleting the account. We act on your instructions and your instructions alone.

Legacy Mode

Legacy Mode is engaged after the account holder’s death. It operates under the written instructions the account holder left in their account settings, which may include:

  • Content that should remain accessible, and at which tier
  • Content that should be sealed or destroyed
  • The designated executor or trusted contact authorised to manage the account
  • The period for which the account should continue operating

We verify evidence of death (for example, a death certificate) before engaging Legacy Mode. We do not act on the request of family members alone unless they are the designated executor.

Deletion

You can delete your Individual account at any time. On deletion, all content, voice models, and avatar data are destroyed within 30 days, except where we are required by law to retain a limited record.

15. Children and young people

Totii is frequently deployed in educational, community, and family settings where learners or members are under 18. In those contexts, we apply the following additional protections:

  • The default deployment collects no personal information from a minor unless the deploying organisation has specifically opted in for a documented educational or safeguarding purpose.
  • In avatar mode, the user’s camera is never activated; only the microphone is used.
  • Conversations are one-to-one and private. No other user, teacher, or administrator sees the live conversation.
  • AI safety filters default to the strictest setting available.
  • An “End Session” control is always available and always honoured.
  • Escalation pathways to a deploying organisation’s safeguarding contact can be enabled on request.

Totii for Individuals is designed for adult account holders. Where a minor is invited as a recipient (for example, a grandchild invited into a grandparent’s legacy account), the inviting adult is responsible for the invitation, and our standard minor-protection controls apply.

16. Cookies and similar technologies

The Totii.ai marketing site uses a small number of strictly necessary cookies to make the site function, and a limited set of privacy-respecting analytics cookies to understand how visitors find us. We do not use cross-site advertising cookies.

The Totii platform itself uses a short-lived session token, cleared when the session ends. No persistent tracking cookies are used inside the platform.

17. Changes to this policy

We may update this policy from time to time to reflect changes to the platform, the law, or our practices. When we make a material change, we will update the version number and effective date above, and — where appropriate — notify customers directly. Earlier versions are retained and available on request.

18. Complaints and external review

Under the Australian Privacy Act 1988, you have the right to lodge a complaint if you believe we have interfered with your privacy or mishandled your personal information. We are committed to resolving your concerns directly and encourage you to contact us first at [email protected] with details of your issue. We will investigate and respond within a reasonable timeframe (typically 30 days) in accordance with APP 1.3.

If your concern remains unresolved, you may lodge a complaint with the Office of the Australian Information Commissioner (OAIC) via their website here or by calling 1300 363 992. The OAIC will assess your complaint and may investigate further if it falls within their jurisdiction. Please note that lodging a complaint with the OAIC does not prevent you from seeking other legal remedies, such as through the courts, if applicable.

19. Contacting Us

For all privacy enquiries, access or correction requests, complaints, or security matters relating to Totii.ai, contact our Privacy Officer using the details below.

Privacy Officer, Totii.ai
Operated by Mr and Mrs Cloud Pty Ltd, with technology delivered in partnership with Shine Me Pty Limited.

  • Email: [email protected]
  • Phone: +61 469 393 220
  • Registered office: 600 Sneydes Road, Werribee, Victoria 3030, Australia
  • Platform owner: Mr and Mrs Cloud Pty Ltd — ABN 77 613 464 136
  • Technology partner: Shine Me Pty Limited — ABN 22 688 961 257 / ACN 688 961 257