PRIVACY AND SECURITY

We take data protection and security seriously

We ensure your data is protected at all times by consistently maintaining the highest standards of privacy and security.

We take data protection and security seriously

Physical Security

  • Access Control: Strict measures to protect our premises and equipment

  • Monitoring: CCTV and security personnel ensure continuous monitoring

Digital Security

  • Encryption: All data is encrypted both in transit and at rest

  • Firewall Protection: Multiple firewalls provide a security layer

  • Endpoint Protection: Protected with anti-virus and ransomware software

Operational Security

  • Vulnerability Assessments: Proactively identify and mitigate security risks

  • Incident Response: Prompt response to security incidents

Regulatory Compliance

  • GDPR: Clickatell adheres to the EU’s General Data Protection Regulation (GDPR), as it is recognized as one of the best privacy frameworks to protect personal information.

  • ISO27001: Clickatell is certified with this internationally recognized standard for Information Security Management Systems, meeting stringent requirements for robust data security controls.

  • SOC2 Type 2: Clickatell is audited annually to meet the requirements for System Organization Control (SOC2), a technical audit that determines whether effective safeguards and controls are in place to meet stringent security and compliance requirements.

  • PCI DSS: Clickatell meets the requirements of the Payment Card Industry Data Security Standard (PCI DSS), adhering to the technical and operational standards required to secure and protect credit card data.

  • CCPA and CPRA: The California Consumer Privacy Act (CCPA) and the California Privacy Rights Act (CPRA) are key data privacy laws in California that provide residents with significant control over their personal information.

  • POPIA: The Protection of Personal Information Act (POPIA) is South Africa’s primary data privacy law, designed to protect personal information processed by public and private entities.

Data, Monitoring and Support

  • Data Retention: We don’t hold onto PII (personally identifiable information) for long (90 days) and we de-identify any PII while we do.

  • Data Impact Assessments: We asses key data privacy considerations such as data collection, storage, security, processing, and retention.

  • Proactive Monitoring: We continuously monitor our systems to ensure optimal performance and security, and incident response.

  • Customer Support: Our dedicated support team is available 24/7 to assist with any security-related issues.

Ensuring Confidentiality, Integrity, and Availability of Data