Data Security

Privacy and GDPR

iSpring respects your right to privacy, and understands that while visiting our website, using our products and services, or otherwise interacting with us, you prefer to control the way your personal information is stored and processed.

iSpring is committed to protecting customers’ and end-users’ data from unauthorized access. We maintain compliance with the General Data Protection Regulation (GDPR) and help our customers to comply with GDPR and other similar regulations.

We execute Standard Contractual Clauses (SCC) to protect customers’ personal information if it’s transferred between EU and non-EU countries.

Trusted hosting providers

We host our servers at trusted providers:

Data protection

iSpring stores data on multiple hosting providers to re-route traffic in case of an emergency. We use a secure HTTPS connection with a firewall to protect our customers’ information.

iSpring uses real-time backup technologies to avoid data loss and interruption of service in case of hardware issues.

We at iSpring monitor the performance of our servers 24/7, including CPU load, RAM usage, free space on the drives, so we can guarantee the efficacy of all our services.

iSpring is continuously implementing the most up-to-date technologies to provide our customers with the highest level of information security. We perform internal and third-party penetration tests and monitor our security system for vulnerabilities on a daily basis.

iSpring Web Services are firewall friendly and can be easily integrated into the network infrastructure of most companies.

You can always contact our tech support team in case of any technical issues.

Employee access

The iSpring team comprises carefully selected trustworthy professionals. We thoroughly check the background of every employee who will have access to customer data. Administrative access is granted selectively and provisionally only to those who have confirmed business needs.

iSpring Certification

iSpring takes customers’ security very seriously and regularly undergoes third-party audits and certifications to demonstrate its compliance with international information security standards.

SOC

SOC is “system and organization controls”. To get SOC certification, an organization must undergo an audit by an independent certified public accountant and prove that it has the appropriate SOC safeguards and procedures.

Click here to request the documentation

ISO 27001

ISO 27001 is an information security standard, containing the best practices for information security management. Meeting ISO 27001 requirements helps organizations protect their information assets so they can be considered trustworthy.

Click here to request the documentation