Trust Center

Security and privacy are at the heart of everything we do.

At Inteliam, we are committed to protecting the privacy and security of our customers. We understand that your personal information is important and we take our responsibility to safeguard it seriously. We strive to provide you with transparency and control over your data, and are dedicated to ensuring that your information is protected from unauthorized access, use, or disclosure. Our trust center is designed to provide you with the information and resources you need to understand how we collect, use, and protect your data, and to help you make informed decisions about how to interact with our products and services.
Our Commitment

Our commitment

We are transparent about the specific policies, operational practices, and technologies that help you ensure the security, compliance, and privacy of your data across Inteliam services.

  1. You control your data.
  2. We are transparent about how it is stored and used.
  3. We secure data at rest and in transit.

Secure by Design

We take a “secure by design” approach to protect our customers' data. This means that we incorporate security and data protection principles into every stage of our product development lifecycle, from initial design through deployment and ongoing maintenance. We conduct regular security assessments, and perform rigorous testing to identify and address vulnerabilities before they can be exploited. Our engineers are trained in secure coding practices, and we follow strict security protocols for every aspect of our product development process.

By taking this approach, we ensure that our products are built to the highest standards of security and data protection, giving our customers the peace of mind they need to trust us with their sensitive information.

Secure By Design
Restricted Data Access

Data Access

We ensure Customer data is protected by limiting internal access and preventing unauthorised access by implementing security measures. Access to data will be granted to employees and contractors based on the principle of least privilege, which means that users will be granted access only to the data necessary to perform their job duties. Access controls are implemented to ensure that only authorised users have access to the data.

We never transmit date over the wire unless it's encrypted. All data is encrypted at rest.

Security Audits

We engage third-party auditors, to conduct regular audits of our security systems and processes such as black and grey box penetration testing. These audits help us identify potential vulnerabilities and improve our security posture. As such, Penetration results are compiled in reports and action plans that feed the development backlog for security enhancements are identified. We only engage auditors who have the necessary certifications and qualifications to perform these audits.

Restricted Data Access
Regular Training

Training & Awareness

we believe that our employees are our first line of defense against cyber threats. That's why we provide regular training and awareness programs to ensure that our employees are up-to-date on the latest security threats and best practices. Our training covers topics such as phishing scams, email security, password management, two-factor authentication, device encryption, and secure data handling. We also conduct regular simulations to test our employees' ability to identify and respond to potential threats. In addition, we require all employees to complete mandatory security awareness training upon joining the company, and we provide ongoing training to ensure that everyone is aware of the latest threats and how to protect against them. By keeping our employees informed and prepared, we can help to minimize the risk of cyber attacks and protect our customers' data.

Our Sub-Processors

At Inteliam, we take the security and privacy of our customers' data seriously. As a data controller, we rely on a network of trusted sub-processors to help us provide our products and services. Sub-processors are third-party service providers that may process personal data on behalf of Inteliam to assist us in delivering our products and services. We have strict policies and procedures in place to ensure that our sub-processors meet our high standards of data protection and privacy. This section provides information about our sub-processors and their roles in processing personal data for Inteliam.
ISO 27001 Compliance Logo GDPR Compliance Logo ISO 27017 Compliance Logo SOC 2 Compliance Logo ISO 27018 Compliance Logo

Microsoft Logo Microsoft

  • Azure
  • IaaS Provider
How we use Microsoft

We use Microsoft Azure as an infrastructure provider.

Location: France

MongoDB Logo MongoDB

  • MongoDB Atlas
How we use MongoDB

We use dedicated MongoDB clusters on Azure Cloud for the database layer of our cloud service.

Location: France

Google Logo Google

  • Google Workspace
  • Office Applications
How we use Google

We use Google for email, office and business applications.

Location: United States

DataDog Logo Datadog

  • Infrastructure Monitoring
  • Metrics / Dashboards
  • Alerting
How we use Datadog

Datadog is used for infrastructure monitoring, analytics, and alerting. We process log files which could include IPs and potentially query parameters.

Location: Europe

Sentry Logo Sentry

  • Error Monitoring
  • Metrics
How we use Datadog

We use Sentry to detect errors that occurred in production that we couldn't detect otherwise.

Location: United States

MailJet Logo MailJet

  • Email Notification Services
  • Marketing Campaigns
How we use MailJet

MailJet is our primary partner for sending marketing and notification emails.

Location: Germany & Belgium