PRIVACY & COMPLIANCE
SECURITYWe deploy network and data access security best practices that meet enterprise standards by:
- Keeping customer data safe using disk and data encryption while at rest and secure protocols while data is in transit.
- Constantly managing and control identity and user access.
- Encrypting communications and operation processes.
COMPLIANCEWe conform to global standards by:
- Using a broad set of international and industry-specific compliance standards, such as ISO 27001, HIPAA, FedRAMP, SOC 1 and SOC 2, as well as country-specific standards like Australia IRAP, UK G-Cloud, and Singapore MTCS.
- Providing rigorous third-party audits.
PRIVACYYou own your data and you are in control of your data.
More information about privacy policies can be found here: