Last updated: 13 February, 2023

Security and Compliance

At Dataspike, we are deeply committed to ensuring the highest standards of privacy and compliance for our clients and their customers. Our internal privacy and compliance procedures are meticulously designed and executed in accordance with the UK GDPR, EU GDPR, CCPA, and other applicable legal requirements. To demonstrate our unwavering dedication to data protection, we have implemented the following measures:

1. Comprehensive Data Protection Policies

We have established clear and comprehensive data protection policies that are easily accessible to our clients and their customers. These policies outline the rights of data subjects and the obligations of Dataspike as a data controller and processor.

2. Regular Audits and Assessments

Dataspike conducts regular audits and assessments to ensure our privacy frameworks are up-to-date and in line with the latest legal requirements. This proactive approach helps us to identify potential gaps and rectify them promptly.

3. Data Processing Agreements

Dataspike enters into Data Processing Agreements (DPAs) with all clients and third-party service providers. These agreements outline the responsibilities and requirements for processing personal data, ensuring all parties involved are compliant with relevant data protection regulations.

4. Data Breach Management

In the event of a data breach, Dataspike follows stringent procedures to promptly identify, contain, and rectify the issue. We are committed to reporting any breaches to the appropriate supervisory authority and notifying affected data subjects as required by law.

5. Ongoing Compliance Updates

We closely monitor changes in data protection legislation and promptly update our policies, procedures, and practices to maintain compliance. This ensures our clients and their customers benefit from the latest advancements in privacy protection.

6. System Access and Customization Capabilities

Dataspike provides a variety of security measures to ensure the safety of your account and maintain the highest level of protection.

7. Secure Authentication

Access to our system is fortified by employing advanced security measures. Passwords are encrypted, and 2-factor authentication is enabled by default for enhanced protection. Additionally, you have the option to utilize Google Account login and Single Sign-On (SSO), which can be activated within the Dataspike dashboard.

8. User Permission Management

To further bolster security, customizable permission levels and roles can be assigned to your team members. This allows you to control access to various aspects of the platform, including settings, billing, user data, and the capacity to send or edit messages. For more information on tailoring permissions and roles to your specific needs, please contact us via the form on the website.

9. Anomaly Detection Features

Dataspike's platform is equipped with sophisticated anomaly detection capabilities that monitor and identify suspicious activities, such as logins from multiple devices, repeated password attempts, or unauthorized API key usage. In the event of a potential breach attempt, our system promptly alerts your technical team and administrators to take appropriate action.

10. Web Application Assessments

At Dataspike, we regularly engage in independent penetration testing to proactively identify and address potential vulnerabilities. This includes examining potential issues arising from unintentional misconfigurations, weak authentication protocols, inadequate error handling, and sensitive information leaks.

11. Protection Against Presentation Attacks

Dataspike's Liveness technology effectively counters various attack vectors by ensuring the highest levels of security and authenticity. Our cutting-edge solution is rigorously tested and constantly updated to stay ahead of evolving threats and maintain its effectiveness against malicious attempts.

Our address

Dataspike Cyprus

Right and Data ltd, Georgiou Seferi, Villa AParekklisia, Lemesos​, 7/1, 4520