Security & Compliance
Secure by Design
From intrusion detection to high availability, these are some of the ways we work towards ensuring your data is safe with us.
- ISO 27001 & SOC 2We are proud to be ISO 27001, ISO 27701 and SOC 2 type 2 certified. Along with our vendors and partners such as Microsoft Azure, we strive to adhere to the most strict policies and demonstrate continuous and constant improvements in all our processes and people.
- Monitoring & LogsWith 3 levels of activity and session logs, as well as internal and external monitoring we are always the first to know when and what happened.
- Privacy ComplianceEvery country and region enforces strong regulations around privacy and we do our best to support our customers in ensuring that those regulations are met.
- Secure DevelopmentOur engineering and development team follows a secure software development practice in each phase of the development lifecycle; training, design, implementation, verification, release and response.
- Continuous TrainingTraining our teams is the best way to ensure that we continue to provide the best service and secure our resources and your data.
- Encryption At-RestTransparent Data Encryption (TDE) does real-time I/O encryption and decryption of data and log files in our databases.
- Encryption In-TransitAll communication to and from servers, database, and client are TLS 1.2 and higher encrypted using private and public certificates.
- Penetration TestingOn demand and at least once a year, we perform penetration testing where a team of ethical hackers and our own engineers attempt to gain access to secured resources.
- Vulnerability TestingWe perform automated vulnerability testing each and every month using a third party service. We support a transparent policy of communicating results to our customers and partners.
- High AvailabilityYour data is stored in multiple databases simultaneously and it is backed up daily with history up to 35 days and long term retention of 3 months.

ISO Compliance
SOC 2 Compliance


Data Privacy & Protection
HIPAA Compliance


Web Content Accessibility Guidelines (WCAG)
6 Security Pillars
People
Processes
Platform
Infrastructure
MONITORING
Data
Ready to Help
Secured Payments



Questions?
Where can I find your latest compliance documents?
Our Trust Center is available at https://trust-center.clicdata.com. Here you can request access to download several compliance documents such as our latest SOC and ISO audit reports, vulnerability and penetration test results, and more.
Do you conduct regular penetration and vulnerability testing?
Yes, ClicData conducts regular penetration testing and vulnerability assessments as part of our commitment to security. These tests are performed by independent security experts who help ensure that our system remains robust against potential threats. By identifying and addressing vulnerabilities proactively, we maintain a secure environment for all our users and their data.
Can I audit ClicData's security and compliance measures?
We understand the importance of transparency in building trust with our customers. ClicData welcomes security audits from our customers. We provide detailed documentation of our security practices and compliance certifications upon request, and we can facilitate third-party audits under specific agreements to ensure that our security measures meet your organization’s requirements.
How does ClicData handle data breaches?
In the unlikely event of a data breach, ClicData has a robust incident response plan that is immediately activated. We notify affected users promptly and take swift action to mitigate any potential impact. Our team works closely with cybersecurity experts to investigate the breach, prevent future occurrences, and ensure continuous improvement of our security practices.