Security & Compliance

Your data security is our top priority. Learn how we protect your information with enterprise-grade security measures.

How We Keep Your Data Safe

End-to-End Encryption

All data is encrypted in transit (TLS 1.3) and at rest (AES-256) to ensure maximum security.

Secure Infrastructure

Hosted on enterprise-grade cloud infrastructure with 99.9% uptime SLA and automatic backups.

Privacy by Design

We collect only essential data and never sell your information to third parties.

GDPR Compliant

Full compliance with GDPR, CCPA, and other data protection regulations.

Regular Security Audits

Continuous monitoring, vulnerability scanning, and third-party security assessments.

Access Controls

Role-based permissions, SSO support, and audit logs for enterprise customers.

Data Protection Practices

Data Storage & Location

All customer data is stored in secure, SOC 2 compliant data centers. We use Supabase (built on PostgreSQL) with automatic backups and point-in-time recovery.

Access Control

We implement strict access controls with role-based permissions. Only authorized personnel have access to production systems, and all access is logged and monitored.

Encryption

Data in transit is protected with TLS 1.3 encryption. Data at rest is encrypted using AES-256. OAuth tokens are encrypted and stored securely.

Third-Party Integrations

We use OAuth 2.0 for Google Workspace and Microsoft 365 integrations. We never store your email passwords. All API connections use secure, encrypted channels.

Compliance & Certifications

GDPR

EU General Data Protection Regulation

CCPA

California Consumer Privacy Act

SOC 2 Type II

In progress - Expected Q2 2026

ISO 27001

Roadmap - 2026

Security Incident Response

We have a comprehensive incident response plan in place. In the unlikely event of a security incident:

  • We will notify affected customers within 72 hours
  • Our security team will investigate and contain the incident immediately
  • We will provide transparent communication throughout the resolution process
  • Post-incident reports will be shared with affected parties

Report a Security Vulnerability

If you discover a security vulnerability, please report it to us responsibly. We appreciate your help in keeping Siggly secure.

Email: security@siggly.io

Have Security Questions?

Our team is here to answer any questions about our security practices.