Data Security and Privacy

Usetiful is compliant and certified to protect the security and privacy of your data:

ISO 27001
ISO 27001
GDPR
GDPR
HIPAA
HIPAA
CCPA
CCPA

We invest into your security

Data Protection Officer

Usetiful has appointed a dedicated data privacy officer who serves as an advocate for data privacy and security across the organization.

Privacy & Security Training

All Usetiful team members receive thorough training and certification in data privacy policies and best practices.

Vendor Audit & Approval Process

Usetiful conducts comprehensive compliance reviews and approval processes before licensing or integrating with any third-party tools.

Data Encryption & Access Tools

All customer data is encrypted in transit and at rest, using only tools, standards, and best practices that meet industry benchmarks for data security and handling.

Role-Based Permissions

Usetiful allows precise control over access, with permissions restricted based on specific roles and authorities to ensure data security.

Audit Trails

Usetiful records every change, action, and event across the system, including data deletion, to facilitate thorough auditing and root cause analysis.

Data Deletion Requests

Usetiful supports requests for data deletion for both data that we manage and data that we process on behalf of customers.

Data Segregation & PII

Customer data is logically separated, ensuring personally identifiable information is never required to fully utilize Usetiful’s product features.

Resilience & Uptime

Usetiful is engineered for continuous uptime at enterprise scale, processing millions of events each hour, ensuring high performance without degradation even as data demands grow.

Documents

  • ISO 27001 Certificate
  • ISO 27001 Statement of Applicability
  • DPA - Template
  • GDPR Representatives list
  • Latest Pentest
  • Security Architecture Diagram

Policies

  • Information Security Management System
  • Security Risk Analysis policy
  • Incident Management policy
  • Business Continuity
  • Data Inventory
  • Data Retention policy
  • Encryption policy
  • Configuration policy
  • Demand Management policy
  • Principles of Engineering Secure Systems
  • Logging
  • Clock Synchronization policy
  • Principles of SW library usage
  • Technical Monitoring policy
  • Access Management policy
  • Clear Desk and Clear Screen policy
  • Recruitment process
  • Security training policy
  • Disciplinary actions policy
  • Supply chain management

Our privacy promise

privacy
We track only what you explicitly request us. We do not proactively collect information about your product nor end users.
privacy
No data exports. Usetiful stores and processes all end user information within European Union.
privacy
No selling of data. Usetiful does not share the end-user information with any third party.