Security Overview
1. Introduction
Although we were founded in Nov 2022, We are already SOC2 Type II Certified. Having 10+ years experience building predictive models using customer success data gives us the ability to ensure we are following all of the industry's best practices to protect our client's data.
Data Security Principles
1. MULTI-TENANT ARCHITECTURE
Your data is never stored with other client's data. Each client's data is stored securely in a unique AWS tenant.
2. ROLE BASED ACCESS CONTROLS
Control users access only to what their role needs. Reduce admin effort maintaining permission sets, but maximize operations efficiency and improve compliance.
You can contact us by emailing success@thedataplant.com.
3. DATA MASKING AND ENCRYPTION
Protection to sensitive data like personally identifiable information (PIIs)Eliminate all of the guess work by using our AI to see what is truly impacting client behavior and outcomes.
You can contact us by emailing success@thedataplant.com.
4. SECURE IMPORTS
Encrypted auth required for data access. All data pulls are logged and auditable by clients.
5. SECURE ARCHIVAL
No storage of raw data or un-used data in any format.
6. SECURE EXPORTS
Encrypted auth and control permissions required for data exports. All data exports are logged and auditable by clients.
7. NON-DISCLOSURES
NDA's signed by all employees & partners.
8. SECURE ADMIN CLOUD
Dedicated admin controlled data access & token-based authentication.
You can contact us by emailing success@thedataplant.com.
8. ENHANCED PASS-THRU SECURITY
Minimalist data access principles. Once processed raw data sources are deleted.
You can contact us by emailing success@thedataplant.com.
Certifications
1. Introduction
We have taken a number of steps to comply with the SOC2 Type II,TAC Email Security and GDPR certifications. For more details about our compliance and how we handle your data please check our latest legal documents below:
GDPR Principles
Explore data safely with security, privacy and control as first principles. Boost your influence within your company with insights that will make sure your voice is heard as you blaze trails forward on initiatives and performance metrics. See some of our product security measures to the right and learn more about how we handle our clients data during service engagements.
- Only grant access to data when absolutely necessary
- Keep all user data in 2-way authenticated enryption.
- Delete or anonymize any PII data when not in use.
3. Accessing our Website
The servers and databases that power Dataplant are hosted on Amazon, Google and or Nvidia architectures. We inevitably use a small number of third parties, some of which are outside of the USA, You can find the full list of these third parties and what we use them upon request in writing.