Data protection and Privacy
Your trust is our foundation. Learn how we protect your business data with enterprise‑grade security, transparent policies, and full user control.
Our privacy principles
Data ownership
Your data belongs to you. We never sell, rent, or share your personal or business information.
- Full data ownership rights
- No data monetization
- Clear data usage policies
Transparency
We are fully transparent about the data we collect, how we use it, and who can access it.
- Clear data collection notices
- Regular privacy policy updates
- Open communication channels
User control
You have full control over your data with privacy settings and easy‑to‑use data management tools
- Granular privacy controls
- Easy data export
- Simple deletion process
Legal compliance
We adhere to major privacy regulations including GDPR, CCPA, and other regional privacy laws.
- GDPR Article 25 compliance
- Privacy by design
- Regular compliance audits
How your data is protected
Military‑grade encryption and enterprise security measures that protect your business data.
Data encryption Your data is encrypted with AES‑256 at rest and TLS 1.3 in transit, providing complete protection from unauthorized access.
- AES‑256 encryption for all stored data
- TLS 1.3 encryption for all data transfers
- Zero‑knowledge architecture — we cannot see your data
- Hardware Security Modules (HSM) for key management
Secure infrastructure
Your data is stored in SOC 2 Type II certified data centers with enterprise‑grade physical and network security.- SOC 2 Type II certified data centers
- 24/7 physical security and monitoring
- Redundant backups across multiple geographic regions
- Intrusion detection and prevention systems
Industry certifications
- Information Security Management
- ISO 27001
- Security and Availability
- SOC 2 Type II
- Privacy Compliance
- GDPR
- Payment Security
- PCI DSS