In accordance with our SOC 2 Type II compliance program, we maintain policies, procedures, and practices documenting our technological, administrative, and procedural safeguards relating to the privacy, security, integrity, and availability of personal data.
Our information security framework includes periodic audits, assessments, and employee privacy and security training.
We undergo annual independent third-party SOC 2 Type II audits that include a risk assessment of the threats to the privacy, confidentiality, security, integrity and availability of personal data, the likelihood that these threats occur, and measures to mitigate these risks.We conduct penetration testing of the network and our application to evaluate the security of our production environment
We only collect the personal data we need to accomplish our business purposes, including names, business email addresses, links to Slack profile pictures, and Slack user metadata. We do not store users’ conversation data on our systems.
When a customer uninstalls our solution, we securely dispose of the personal data in our possession by deleting the customer’s data from our systems.
We conduct background checks on all of our employees using Checkr.
We regularly train all our employees on our information security program, the importance of the security, confidentiality, and privacy of personal data, and the risks to our company and its customers associated with security incidents.
We only permit access to personal data, sensitive information systems, and our premises to authorized employees based on their role and with prior approval.
Terminated employees are prevented from accessing personal data and lose access to all devices and applications upon termination.
In accordance with our SOC 2 Type II compliance program, we maintain policies, procedures, and practices documenting our technological, administrative, and procedural safeguards relating to the privacy, security, integrity, and availability of personal data.
Our information security framework includes periodic audits,assessments, and employee privacy and security training.
All communication between customer systems and our platform takes place using high levels of encryption (TLS 1.2/HPPS).
All stored data, session cookies, and backups are encrypted at rest. Our databases are also encrypted using custom keys for additional security.
We use industry-standard encryption and a monitoring agent to protect the data stored on company laptops.
We store all personal data on private networks that require VPN to access, and we conduct biannual penetration testing to evaluate the security of the network.
We have implemented Snyk to detect and remedy malicious or unsecure code designed to perform an unauthorized function on, or permit unauthorized access to, any information system.
We remediate any malicious or unsecure code promptly upon identification.
We conduct biannual vulnerability assessments to detect vulnerabilities on the network, and we have implemented processes to remediate any detected vulnerabilities.
We maintain application security and software development controls, including private networks, custom key encryption, and biannual penetration testing, to detect and prevent the introduction of security vulnerabilities.
Prior to implementing code changes, our employees follow a documented change management process to assess the potential security and product impact of such changes.
We document all changes to our information systems as part of merger requests.
We monitor and document the movement of records or media using Vanta, an automated security and compliance platform.
We have implemented strict password protection on all personal devices that access our systems.
We maintain restrictions on physical access to our offices and information systems through the implementation of strict access controls that are recorded in a digital registry