Enterprise-Grade Security and Trust’s Enterprise-Grade Platform Infrastructure is Built With Security, Compliance, and Trust in Mind

Get A Demo

Our Security Commitment

At, Customer Trust is Our #1 Priority drives transparency and alignment across go-to-market teams while automating the manual task of data entry into the CRM. With this level of data transparency also comes great responsibility to maintain the highest standards of data privacy and security. With an ongoing focus on security, data privacy, and GDPR readiness, we aim to strike a balance between transparent communications and maintaining your employees’ and customers’ privacy rights.


Security and Privacy Are at the Forefront of Every Decision We Make was built from the ground up with enterprise security in mind. Our customers entrust sensitive data to our care. Keeping it secure is our mission. We ensure the security of your data in our sales management software with encryption in transit and at rest. The application undergoes regular penetration testing and security reviews by white hat security firms. is designed to be GDPR compliant. We are also SOC 2 Type II-certified.’s computing infrastructure is provided by Amazon Web Services, a secure cloud services platform. Amazon’s physical infrastructure has been accredited under ISO 27001, SOC 1/SOC 2/SSAE 16/ISAE 3402, PCI Level 1, FISMA Moderate, and Sarbanes-Oxley.

Enterprise Ready Compliance

SOC 2 Type II

We are SOC 2 Type II certified. This certification is reserved for organizations that have demonstrated standard operating procedures for organizational oversight, vendor management, risk management, and regulatory oversight over a length of time.

ISO 27001:2013

Companies which achieve ISO 27001:2013 certification demonstrate that they adhere to information security best practices, policies, and procedures that include more than just logical and physical security controls.

Secure and Reliable Infrastructure

Amazon Web Services (AWS) uses Amazon Web Services (AWS), exclusively, for the hosting of staging and production environments. AWS data centers are monitored by 24×7 security, biometric scanning, video surveillance and are SOC 1, SOC 2, and SOC 3 certified. (Read more about AWS Security)

World-Class Application Security

Data Encryption Data is encrypted in-transit using bank-grade TLS 1.2, the safest method available today. Data is encrypted at-rest using 256-bit encryption via native AWS capabilities including S3 with a per-client encryption key and separate S3 buckets.

OAuth Customers always authenticate via their platforms of choice (Okta, GSuite or Office365) and never set a password.

Continuous Commitment to Security

Penetration Testing In addition to our annual SOC 2 audits, is committed to conducting manual penetration testing by specialized Tier-1 vendors. Latest reports from our partners at Casaba are available upon request. Additionally, we use multiple scanning services to continuously scan our application, both from outside and inside, daily.

Continuous Threat Monitoring We employ multiple solutions to provide continuous threat intelligence and vulnerability testing, with real-time alerting. Static and dynamic code analysis is a core component of our continuous integration and delivery software development approach.

Dedicated Security Team We employ onsite staff responsible for reviewing, updating, testing and maintaining our security and privacy controls in accordance with our SOC 2 certification and in preparation for new certifications, security threats, laws and regulations.

Security Project Reviews All engineering project must go through architecture reviews and receive sign off from the Security team before work can begin.

Security Code Reviews Engineers are required to complete a security review checklist as a part of software development life cycle for all code changes.

Internal Processes

SSO / SCIM / MDM We never use or store passwords internally. From the wifi and applications we use to do our jobs, to how we secure our physical location, the only authentication source-of-truth is our SSO / SCIM / MDM solution. does not support login or password-driven access. All access controls are centralized around tight integration with our IAM system (Okta), MDM (Okta), and AWS IAM per industry best practices. Breach Notifications We treat breaches with the highest level of urgency and are committed to delivering timely communications to customers who might be impacted. Any breaches will be communicated within 72 hours per internal process and GDPR compliance. FYI: There have been no recorded breaches to date.

Employee Devices We use Macs exclusively. Each Mac is fully-managed. Only managed machines can get onto our network, or AWS. Our policies prohibit anyone from being able to move customer data to an unauthorized device, as well as to any laptop or other device. Our policies restrict all employees from downloading data from our production environment, mounting external drives in MacOS on personal devices, or transferring files online without leaving a significant trail behind. Mandatory Employee Training All employees are required to complete training on data privacy and best practices for securing and handling user data. Employee Background Checks All employees go through thorough background checks executed by a Tier 1 vendor as a prerequisite for employment.

How Does People․ai Maintain GDPR Compliance?

Data Protection by Design and by Default (Article 25)

  •  All customer data is stored in logically separated AWS S3 buckets with double encryption, using native AWS means and AES 256-bit encryption algorithm
  •  Review of data sharing and processing agreements of all partner organizations to ensure compliance with the provisions of the GDPR
  •  Exclusive use of AWS infrastructure for all data processing

Right to Data Portability (Article 20)

  •  Export activity by request

Right to Erasure (Article 17) 

  • Data deletion requests are triple-validated, and thorough

Pseudonymisation (Article 5(c))

  • Everything is encrypted, everywhere
  • No personal data in application logs

Breach Notifications (Article 33)

  •  Early notification upon identified breach
  •  Details about our commitments are outlined in our EUSA

Sensitive Content

  • Automated sensitive content flagging and notification
  • does not collect or store PCI, HIPAA or Special Categories of Personal Data (Article 9)

Opt-Outs for All External Communications

  •  All customers have the right and option to opt-out of communications

Employee Training

  • Mandatory onboarding training on data protection, GDPR, and the rights and freedoms of data subjects
  • Quarterly engineering training on InfoSec and web application security

Security is Our Top Priority

Contact security at

To report vulnerabilities, use our Security Reporting form.

Oleg Rogynskyy

" has always considered security and privacy as a top requirement for our Product, Infosec, and Engineering teams. While many companies scrambled to become GDPR-ready before the May 25, 2018 deadline, had been preparing for more than a year. GDPR compliance is crucial for our success, and we plan to stay ahead of the pack! Nothing is more important to us than the trust of our customers."

Oleg Rogynskyy