Security & Trust
Your security is our priority. We are SOC 2 Type 2 compliant, and we implement advanced security measures to protect your information.
Explore our SafeBase Trust Center to learn about our robust security measures, data protection protocols, and compliance certifications.
We're SOC 2 compliant
We are officially SOC 2 Type 2 compliant under the standards established by the American Institute of Certified Public Accountants (AICPA).
Communication security
All communication is secured by using SSL AES 256-bit encryption. This is the highest level of encryption commercially available.
100% secret
We don't sell or disclose your data to anyone. At all. Ever.All Inkle team members are vetted and background-checked.
Complete access control
Inkle team members use SSO where possible for all softwares, or encrypted password vaults with randomised passwords. API keys are all hashed before storing.
Multi-layered defence
All data is stored on secure AWS servers in the US regions and regularly backed up globally. Everything is triple checked for zero obvious exposures.
Vulnerability reports
Our company values security and encourages responsible reporting of vulnerabilities. If you discover a potential security issue, please report it to us.
FAQs
We provide an option to delete customer data upon request and will ensure that the data is erased within a set timeframe.
We appreciate your help in reporting bugs and have a vulnerability reporting system set up as documented here. Please reach out to security@inkle.io to report a bug.
We enforce stringent password security policies and MFA (Multi-factor Authentication) based access for all our employees via a central active directory. We strictly monitor access to customer data and only permit it on an as-needed basis.
Yes, our platform adheres to the SOC2 Type 2 security framework. We undergo regular third-party audits to maintain compliance and improve our security practices.
We ensure that data is backed up across multiple locations and can be retrieved within our recovery time objective if a failure does occur.
Additionally, we have a tested and detailed business continuity and disaster recovery plan in the event of a major disruption to one of our key service providers.
We use the Advanced Encryption Standard (AES) algorithm with a key size of 256 bits and with a unique and proper encryption key rotation policy for each customer.
Still have questions?
Reach out to our support team if you have any additional questions regarding filing.