Data Protection
We take extensive measures to protect your data. All data transmitted between users and our servers is encrypted using TLS to prevent unauthorized access during transit. Sensitive data stored on our servers is encrypted at rest, following industry-standard protocols. Access to this data is tightly controlled through role-based permissions, ensuring only authorized personnel can access sensitive information.
We also adhere to a GDPR-compliant data deletion policy, ensuring that personal data is permanently removed from our servers upon user request or at the end of the data retention period. Furthermore, we maintain comprehensive audit logs to track data access and modifications for monitoring and compliance purposes.
Compliance and Certifications
We adhere to globally recognized standards for data security and compliance. ToolJet meets the requirements of the following certifications:
- GDPR: ToolJet fully complies with the General Data Protection Regulation (GDPR), ensuring your personal data is processed and stored securely.
- SOC 2: We undergo regular SOC 2 Type II audits to validate our commitment to maintaining high security, availability, and confidentiality standards.
- ISO 27001: ToolJet follows the ISO 27001 standard for information security management, ensuring a systematic approach to managing sensitive information.
Incident Response
We continuously monitor our systems for suspicious activities or security incidents. In the event of a security breach, we have a detailed incident response plan in place. This plan ensures immediate action is taken to contain the breach, communicate with affected parties, and implement remediation steps to prevent future incidents.
Secure Development Practices
Security is embedded in our development processes. Our development team performs regular code reviews to detect and resolve vulnerabilities early. We follow industry best practices for secure coding to minimize risks. We conduct regular VAPT testing, and the report is available upon request. Routine vulnerability scans are conducted to detect and address potential threats, and we engage external auditors for penetration testing to simulate real-world attacks and identify any weaknesses.
User Responsibility
We encourage all our users to practice good security habits to enhance security further. This includes creating strong, unique passwords for ToolJet accounts and enabling two-factor authentication for added protection. Users should also keep their devices and applications updated to guard against vulnerabilities.
Privacy Policy
ToolJet takes privacy seriously. Our transparent privacy policies ensure customers understand how their data is collected, stored, and processed. We adhere to privacy regulations in all regions in which we operate.
Contact Us
If you have any questions regarding our security and compliance practices, please contact us at hello@tooljet.com.