At Spendbase, we understand the importance of data security and privacy for our customers. Ensuring that your data is securely stored and managed is our top priority.
Data Storage and Security at Spendbase
AWS Servers in the EU: All data pulled from your connected integrations, such as Google Workspace and direct API SaaS integrations, is securely stored on Amazon Web Services (AWS) servers located within the European Union. This geographical location helps ensure compliance with strict EU data protection regulations.
Strict Encryption Protocols
Data Encryption: To protect your privacy and the integrity of your data, all information stored on our servers is encrypted. Encryption occurs both in transit and at rest, ensuring that your data is secure from unauthorized access at every stage.
Controlled Access
No Direct Access: Security is further enhanced by our strict access policies. No one, including our engineering team, customer support and customer success departments, has direct access to the production database or to any customer’s Spendbase account. This policy is a cornerstone of our commitment to data security.
Data Retention and Deletion
Handling Disconnected Integrations: If you choose to disconnect your integrations, the data associated with those integrations is immediately erased from our servers. We do not store your data beyond your use of our services, ensuring that you retain full control over your information.
Reassurance for Our Customers
Commitment to Data Security: Our use of AWS, one of the world’s leading secure cloud services platforms, demonstrates our commitment to maintaining the highest security standards. The AWS infrastructure is designed to provide the highest levels of security for its data centers, making it a trusted partner for storing your sensitive information.
Compliance and Best Practices: Spendbase adheres to best practices and policies that comply with the latest security standards and regulations. This ensures that your data is not only stored securely but also managed in accordance with the best security practices available.