Plans & PricingSignup for Free

Security & Compliance

Protecting your data is our job. Our platform runs 100% on the world's leading cloud providers and we partner with Microsoft Azure and AWS to ensure your data is always available and always secure.

Secure by Design

Security is not built after the fact, it needs to be implemented by design in everything we do. 
From intrusion detection to high availability, these are some of the ways we work towards ensuring your data is safe with us. 
  • ISO 27001 & SOC 2
    We are proud to be ISO 27001, ISO 27701 and SOC 2 type 2 certified. Along with our vendors and partners such as Microsoft Azure, we strive to adhere to the most strict policies and demonstrate continuous and constant improvements in all our processes and people.
  • Monitoring & Logs
    With 3 levels of activity and session logs, as well as internal and external monitoring we are always the first to know when and what happened.
  • Privacy Compliance
    Every country and region enforces strong regulations around privacy and we do our best to support our customers in ensuring that those regulations are met.
  • Secure Development
    Our engineering and development team follows a secure software development practice in each phase of the development lifecycle; training, design, implementation, verification, release and response.
  • Continuous Training
    Training our teams is the best way to ensure that we continue to provide the best service and secure our resources and your data.
  • Encryption At-Rest
    Transparent Data Encryption (TDE) does real-time I/O encryption and decryption of data and log files in our databases.
  • Encryption In-Transit
    All communication to and from servers, database, and client are TLS 1.2 and higher encrypted using private and public certificates.
  • Penetration Testing
    On demand and at least once a year, we perform penetration testing where a team of ethical hackers and our own engineers attempt to gain access to secured resources.
  • Vulnerability Testing
    We perform automated vulnerability testing each and every month using a third party service. We support a transparent policy of communicating results to our customers and partners.
  • High Availability
    Your data is stored in multiple databases simultaneously and it is backed up daily with history up to 35 days and long term retention of 3 months.

ISO Compliance 

We are proud to be certified in ISO 27001:2022, ISO 27001:2019, and ISO 27701, showcasing our unwavering commitment to information security and data privacy. Partnering with trusted vendors like Microsoft Azure, we adhere to stringent policies and continuously improve our processes and practices to ensure the highest standards of security and compliance.

SOC 2 Compliance

Achieving SOC 2 Type 2 certification highlights our dedication to upholding the highest standards of security, availability, and confidentiality. Through partnerships with trusted vendors like Microsoft Azure, we implement robust controls and continuously enhance our processes to deliver a secure and dependable platform for our customers.

Data Privacy & Protection

Our compliance with GDPR and CCPA underscores our commitment to protecting customer data and ensuring privacy rights. By adhering to these rigorous regulations, we implement transparent practices and robust safeguards, empowering our customers to trust in the security and integrity of their data.  

HIPAA Compliance 

Compliance with HIPAA demonstrates our commitment to protecting sensitive healthcare data and ensuring privacy and security. We follow stringent regulations to safeguard information, providing our customers with confidence in the secure and compliant handling of their critical health-related data.

Web Content Accessibility 
Guidelines (WCAG) 

We strive to make our platform more accessible by aligning with the Web Content Accessibility Guidelines (WCAG). By following these standards, we aim to create a more inclusive experience, enabling individuals of all abilities to use our platform effectively.

6 Security Pillars

ClicData adopted a strong security approach from early stages and continues to base itself on these concepts.
People
Security starts with people. We foster a culture of security awareness through regular training, clear policies, and strict access controls to ensure every team member understands their role in protecting customer data.
Processes
We implement and continuously refine robust security processes, from risk assessments to incident response protocols, aligned with industry standards to ensure consistent, repeatable, and auditable protection practices.
Platform
Security is embedded into every layer of our platform, from authentication and role-based permissions to activity logging and anomaly detection. We design with compliance in mind to give you confidence in every interaction.
Infrastructure
Our infrastructure is built on secure, redundant, and scalable cloud environments. We leverage trusted providers with certifications such as ISO 27001 and perform regular security audits and vulnerability assessments.
MONITORING
We continuously monitor systems, access logs, and application behavior to detect unusual activity in real time. With automated alerts and manual oversight, we ensure swift responses and proactive threat mitigation.
Data
Your data is encrypted at rest and in transit, with strict access management and regular integrity checks. We follow data privacy regulations such as GDPR to ensure your information is handled securely and responsibly.

Ready to Help

If you have a data privacy request or need additional information or access to our Trust Center, contact our team.
Contact our Security & Compliance Team 

Secured Payments

ClicData is audited by SecurityMetrics and consistently passes all relevant certifications (PCI DSS) regarding the use of Payment Cards in ClicData.
We do not store your payment information in ClicData and rely on Braintree, a PayPal company for the processing and storage of all payment information.

Questions?

Maybe the answer is here and if not then simply reach out to us.

Where can I find your latest compliance documents?

Our Trust Center is available at https://trust-center.clicdata.com. Here you can request access to download several compliance documents such as our latest SOC and ISO audit reports, vulnerability and penetration test results, and more.

Do you conduct regular penetration and vulnerability testing?

Yes, ClicData conducts regular penetration testing and vulnerability assessments as part of our commitment to security. These tests are performed by independent security experts who help ensure that our system remains robust against potential threats. By identifying and addressing vulnerabilities proactively, we maintain a secure environment for all our users and their data.

Can I audit ClicData's security and compliance measures?

We understand the importance of transparency in building trust with our customers. ClicData welcomes security audits from our customers. We provide detailed documentation of our security practices and compliance certifications upon request, and we can facilitate third-party audits under specific agreements to ensure that our security measures meet your organization’s requirements.

How does ClicData handle data breaches?

In the unlikely event of a data breach, ClicData has a robust incident response plan that is immediately activated. We notify affected users promptly and take swift action to mitigate any potential impact. Our team works closely with cybersecurity experts to investigate the breach, prevent future occurrences, and ensure continuous improvement of our security practices.

Privacy is important.

Essential Cookies
Required for website functionality such as our sales chat, forms, and navigation. 
Functional & Analytics Cookies
Helps us understand where our visitors are coming from by collecting anonymous usage data.
Advertising & Tracking Cookies
Used to deliver relevant ads and measure advertising performance across platforms like Google, Facebook, and LinkedIn.
Accept AllSave OptionsReject All