All policies and documents related to doing business with Softbrik can be found here. Should any information be missing - drop us a Voice Message.
Softbrik employs state of the art double encryption policy. The information below discusses the policies and procedures in place for dealing with Data Safety and Security.
Softbrik requires regular account users to login. No features are available without a secured authentication. Softbrik uses 128-bit SSL encryption for all authenticated sessions. This means that data sent to the Softbrik API as well as data retrieved through the Softbrik account management interface is protected.
2. Data Retrievability
You are limited to retrieving only your own data through your secured account. Data stored in your Softbrik account is only available to you. Each request to retrieve data from Softbrik must be authenticated. Furthermore, requests are restricted to the currently logged-in account.
Requests made to the Softbrik internal API require a logged in account and will not return outputs successfully otherwise.
3.Credit Card Information
We never store your Credit Card information. When you purchase a paid Customer.io subscription, your credit card data is not transmitted through nor stored on our systems. Instead, we depend on Stripe, a company dedicated to this task. Stripe is certified to PCI Service Provider Level 1, the most stringent level of certification available. Stripe’s security information is available online.
4. Softbrik Team Access
Access to servers is restricted to infrastructure engineers alone. Each employee is provided access through a unique key that can be revoked if needed. Each employee has their own login to our administrative web interface which can also be revoked. Softbrik account or business teams will not have any access rights to your environment. For support issue resolution, they may request temporary authentication or a live session with secured remote access management tools.
5. Intrusion Testing
Softbrik periodically performs various Intrusion and Penetration Testing to assess system vulnerabilities. If you need specific testing for compliance reasons, please email us at email@example.com
While we are extremely vigilant about security, vulnerabilities can occur from time to time. If you see any direct or potential vulnerability, we will greatly appreciate if you can drop us a quick email to firstname.lastname@example.org and we will investigate further accordingly.
We’ll work with you to make sure we understand the issue and address it. We consider security correspondence and vulnerabilities our highest priorities and will work to address any issues that arise ASAP.