At Akkio, we take our data privacy and security obligations seriously. Our platform, processes, and systems are designed to protect our users and their data. We have implemented information security controls in every part of our operations and we are consistently working to strengthen our stance.
Akkio builds on infrastructure from Amazon Web Services (AWS) and Google (GCP) which provide industry-leading security, privacy, operation monitoring, and compliance.
We store all user data in secure, locked-down, redundant infrastructure operated by AWS and GCP. When you visit our website or use our platform, the data in transit is protected end-to-end using 256-bit TLS encryption. At rest, Akkio encrypts data using AES-256. Servers are segmented based on role and protected using restrictive firewalls.
Our people can only access the data they need to do their job. We follow a need-to-know with least privileged access principle and won’t access user data without your permission. Employee workstations are configured with full-disk encryption, strong passwords, and automatic locking. Employees are prohibited from installing unauthorized software or using portable media. All employees and contractors are bound by NDA.
We employ continuous monitoring and alerting for operation anomalies and our team is on-call 24x7x365. Logging of access and events provides the ability to audit and conduct forensics as needed. Incident management procedures for security events include informing users and supporting remediation efforts.
For more information, to report an issue, or to ask any questions, contact email@example.com.