

Bitrix24
Based exclusively on public evidence • 20 criteria (Privacy + AI)
Last review: 21 Feb 2026
AI Trust Summary
- •In AI: it does not document retention periods for AI-generated data, which can create uncertainty about data management.
- •In Core Privacy: it does not establish adequate safeguards for processing sensitive data, exposing your company to potential risks.
Safer Alternatives
Higher-rated software in the same category
Attention Points in AI (2)
AI criteria that require attention. Buy the Premium Analysis to see all 2 criteria.
- •Bitrix24
- •Does not inform retention periods for AI data, which can create uncertainty in data management.
- •Does not document ethical AI principles, raising concerns about bias in automated decisions.
- •Requiring contractual clauses that address these aspects can mitigate risks.
Ethical AI principles and anti-bias measures not documented
There is no mention of ethical AI principles, which can raise concerns about bias and discrimination in automated decisions.
AI data retention (prompts and responses) is not disclosed
The policy does not specify retention periods for contact data and sales interactions, which can create uncertainty about data management.
Source: vendor public documents
Compliances in AI (3)
AI criteria the company meets. Buy the Premium Analysis to see all 3 criteria.
- •Bitrix24
- •Documents data processing purposes for contacts, connecting them to legal bases.
- •Clearly identifies controller entities with contact information.
- •These practices facilitate transparency and trust in data management during due diligence.
Use of artificial intelligence clearly disclosed in policies
The policy explicitly states the use of artificial intelligence, allowing customers to understand how their sales interactions are managed.
AI features clearly identified with their purposes
The policy describes functionalities that use AI, allowing customers to understand how their sales interactions are analyzed.
Contestation and human review of AI decisions available
The policy mentions the possibility of contesting automated decisions, but does not establish a clear process, which can impact customer trust.
Source: vendor public documents
Highlights in Privacy (3)
Most relevant criteria for this category. Buy the Premium Analysis to see all 3 criteria.
Sensitive data processing without additional documented safeguards
The policy acknowledges that user files may contain sensitive information, but does not establish adequate safeguards, which can create risks.
Data controller and processor roles clearly defined
The policy clearly identifies data controllers, facilitating the understanding of responsibilities in managing contact data and sales interactions.
Data controller identity and contact clearly disclosed
The policy provides clear information on who is responsible for the data, facilitating contact in case of questions about contact data and sales interactions.
Source: vendor public documents
Critical Alerts
- •Tratamento de dados sensíveis sem salvaguardas adicionais documentadas: Crucial para a proteção de dados sensíveis e conformidade legal..
- •Princípios de IA ética e medidas anti-viés não documentados: Crucial para a confiança e responsabilidade na utilização de IA.
Conformance analysis (20)
Data controller and processor roles clearly defined
Reference: ISO/IEC 27701 (7.3)
Use of artificial intelligence clearly stated in policies
Reference: ISO/IEC 42001 (7.4)
Identity and contact of the data controller clearly informed
Reference: ISO/IEC 27701 (7.3)
Source: vendor public documents
Follow this company and access all 20 criteria
Track score changes, get alerts on policy updates, and view the full conformance analysis
Don't miss any update
Sign up to follow this company and track changes in privacy and AI scores
Why trust the AITS Index: Open Community Audit
Public transparency, peer review and open evidence trails — all verifiable by the community
Trust guarantees
Peer review
users, professionals and experts confirm or contest items online.
Public history
vendor and index changes are versioned and accessible.
Participate
Evidence, confirmations and contestations
participate in the collaborative validation of AITS criteria
Bitrix24 CRM: Understanding Privacy and Security Strengths and Weaknesses
Clear Data Processing Purposes
Bitrix24 excels in providing transparency regarding the purposes of data processing. Users can easily find information categorized by data type, which is essential for compliance with regulations like GDPR and LGPD. This transparency not only fosters trust but also empowers users to make informed decisions about their data. With an OPTI Base (Privacy) Score of 69%, Bitrix24 demonstrates a commitment to clarity in data handling, ensuring that users know how their information is being utilized. This is particularly beneficial for businesses that prioritize data protection and need to adhere to strict privacy laws.
Transparent Data Controller Information
Another strength of Bitrix24 is its clear communication regarding the identity and contact details of the data controller. This is crucial for users who may need to reach out for inquiries or to exercise their rights under privacy regulations. Knowing who is responsible for data management helps users feel more secure in their interactions with the platform. This aspect of transparency can enhance user confidence, as it aligns with the principles of accountability outlined in ISO 27701.
Lack of Clarity on AI Data Retention
Despite its strengths, Bitrix24 has notable weaknesses, particularly concerning the retention of data generated by AI. The platform does not document the retention periods for prompts and responses generated through AI features. This lack of information can create uncertainty for users regarding how long their data is stored and when it might be deleted. To mitigate this risk, users should consider regularly reviewing their AI-generated data and implementing internal policies for data retention that comply with GDPR and LGPD requirements.
Insufficient Safeguards for Sensitive Data
Another significant concern is the handling of sensitive data without adequate documented safeguards. This shortcoming exposes users to potential risks, especially if they are processing personal data that falls under stricter regulations. Users should exercise caution when inputting sensitive information into Bitrix24 and consider utilizing additional encryption or anonymization techniques. Regular audits of data handling practices can also help ensure compliance with privacy laws and protect sensitive information.
Ethical AI Principles and Anti-Bias Measures
Bitrix24's lack of documentation regarding ethical AI principles and anti-bias measures is another area for concern. Without clear guidelines and practices in place, users may unknowingly expose themselves to risks associated with biased AI outputs. To address this, users should actively seek out training and resources on ethical AI practices and consider implementing their own checks to evaluate the fairness and accuracy of AI-generated data. This proactive approach can help mitigate potential biases and enhance the overall integrity of data processing.
Practical Steps for Enhanced Privacy Management
To enhance privacy management while using Bitrix24, users should take several practical steps. First, regularly review and update privacy settings to ensure compliance with GDPR and LGPD. Enable features that allow for data minimization and limit the sharing of sensitive information. Additionally, consider conducting periodic audits of data processing activities to identify any areas of non-compliance or risk. By taking these precautions, users can better protect their data and ensure that their use of Bitrix24 aligns with best practices in privacy and security.
Other Sales CRM software
Dive into in-depth research and analysis of each player
Source: vendor public documents
Analyzed Sources
Public documents used in the audit of Bitrix24:
Evidence, confirmations and contestations
participate in the collaborative validation of AITS criteria
Scope & Limitations
TrustThis/AITS assessments are based exclusively on publicly available information, duly cited with date and URL, following the AITS methodology (privacy & AI transparency).
The content is indicative in nature, intended for screening and comparison, not replacing internal audits.
TrustThis/AITS does not perform invasive tests, does not access vendor technology environments and does not process customer personal data. Conclusions reflect only the vendor's public communication at the date of collection.
Source: vendor public documents






