SentioCX Developers Hub Help

Security and data privacy

At SentioCX, we understand the critical importance of security and data privacy in today's digital landscape.

We prioritize the protection of our clients data and ensure a robust security framework to maintain the confidentiality, integrity, and availability of your information. This document outlines our approach to security and data privacy.

Security by Design

Our approach is grounded in the principle of Security by Design, ensuring that security is an integral part of our product's foundation, from its inception to ongoing development and maintenance.

Authentication and Access Control

Users

Users must be authenticated in order to access the system. User authenticated sessions are terminated in case of user inactivity.

Single Sign On (SSO)

For convenience and best user experience, SentioCX provides the option to enable SSO for users at tenant level. We implement industry standard identity federation protocols like OpenID Connect and SAML for best security and ease of configuration.

Role based Access Control (RBAC)

SentioCX uses roles to enable fine grained user access to features and data. A user with administrator role can manage roles for the other users in the tenant.

API

API endpoints exposed by SentioCX are protected using industry standard Oauth2 authorization framework. All endpoints implement TLS (Transport Layer Security) encryption.

Tenant data isolation

SentioCX is built as a multi-tenanted system to ensure maximum level of isolation and security.

Every one of our customers is treated as a separate tenant. The data is isolated end-to-end at the tenant level. By default, tenants share the infrastructure, but we are able to accommodate dedicated tenant infrastructure when situation requires.

Data ownership

The data entered and managed in our system by a customer (tenant) is the property of the customer.

Account and Billing data is required by SentioCX. This data is managed separately from the multi-tenanted application data.

Data confidentiality

SentioCX does not share the data with third party entities.

SentioCX does not access the data unless unless a prior agreement is arranged between SentioCX and the tenant.

Data encryption

We employ industry-standard encryption protocols to safeguard your data during transit and at rest. This includes TLS (Transport Layer Security) for data in transit.

We encrypt all data stored in our system, ensuring that your information remains confidential and secure. We leverage storage technology provided by our certified Cloud infrastructure providers.

Data retention

SentioCX stores data for 90 days starting from the day the subscription to our services has ended.

Conversations data

Some integration models require that conversational data passes through our infrastructure.

SentioCX does not store this data for long term.

For example, the messages between users and agents are stored in our system until delivery to the recipient is confirmed, and deleted immediately.

Data residency

Our goal is to meet our customers requirements regarding legal and regulatory compliance, data sovereignty and performance.

We currently provide our services from data centers located in Frankfurt, Germany.

In the future we will make our services available in other geographical locations.

Regulatory compliance

GDPR

SentioCX acts as a data processor and a data controller under the GDPR.

Data processor:

  • for personal data and information that gets uploaded into our system through regular use of provided applications and services.

  • SentioCX does not access the tenant data unless a prior agreement is arranged between SentioCX and the tenant.

  • SentioCX collects log data required for ensuring the quality and availability of the system. We do not collect or store any Personally Identifiable Information (PII) in the log data, neither Personal Data such as conversation data between the customers, agents and chatbots.

Data controller: for data collected to provide our products, services and customer support. This may include information as customer name and contact information.

Infrastructure Security

Our infrastructure is hosted on secure and compliant public cloud providers, adhering to industry-leading security standards ((ISO 27001, SOC, PCI-DSS).

The production environment (used by our customers) is hosted separately from the environments used for development. There is strict and audited access control to production environment based on the least privilege principle.

Business continuity

We constantly monitor our service availability and quality in order to immediately respond to any anomaly:

  • external uptime and synthetic monitoring

  • technical and business features metrics collected from our platform and (micro) services

  • infrastructure provider metrics

Regular data backups are performed to prevent data loss. Our disaster recovery plans are in place to minimize downtime and ensure the continuity of service in the event of unforeseen incidents.

Transparent Communication

In the event of a security incident, we are committed to transparently communicating with our users. Our incident response plan ensures swift action, and we keep you informed throughout the resolution process.

Last modified: 15 March 2024