PRIVACY & COMPLIANCE
SECURITY
We deploy network and data access security best practices that meet enterprise standards by:- Keeping customer data safe using disk and data encryption while at rest and secure protocols while data is in transit.
- Constantly managing and control identity and user access.
- Encrypting communications and operation processes.
COMPLIANCE
We conform to global standards by:- Using a broad set of international and industry-specific compliance standards, such as ISO 27001, HIPAA, FedRAMP, SOC 1 and SOC 2, as well as country-specific standards like Australia IRAP, UK G-Cloud, and Singapore MTCS.
- Providing rigorous third-party audits.
PRIVACY
You own your data and you are in control of your data.More information about privacy policies can be found here: