Privacy & Security

Your data security and privacy are our top priorities. Learn how we protect your information and ensure compliance with global data protection standards.

End-to-End Encryption

All data transmitted through our platform is encrypted using industry-standard TLS 1.3 protocols. Your sensitive information is protected both in transit and at rest.

Secure Infrastructure

Our infrastructure is hosted on enterprise-grade cloud servers with 24/7 monitoring, automatic backups, and redundancy to ensure maximum uptime and data integrity.

Access Controls

Role-based access controls ensure that only authorized personnel can access sensitive data. All access is logged and monitored for security audits.

Data Protection & Compliance

Soshogle is committed to protecting your privacy and complying with all applicable data protection laws and regulations. Our platform adheres to the highest standards of data security and privacy.

Compliance Certifications

  • GDPR Compliant: We comply with the European Union's General Data Protection Regulation, ensuring the protection of EU citizens' personal data.
  • PIPEDA Compliant: We adhere to the Personal Information Protection and Electronic Documents Act, protecting the privacy of all Canadian residents.
  • TCPA & CAN-SPAM Compliant: Our communication features are designed to help you maintain compliance with telecommunications and email marketing laws.
  • SOC 2 Type II: Our security controls and practices meet the rigorous standards set by the American Institute of CPAs.

Security Measures

Data Encryption

All data is encrypted using AES-256 encryption at rest and TLS 1.3 in transit. This military-grade encryption ensures that your data remains secure even in the unlikely event of a breach.

Authentication & Authorization

We implement multi-factor authentication (MFA) options, strong password requirements, and session management to prevent unauthorized access to your account.

  • Password complexity requirements
  • Optional two-factor authentication (2FA)
  • Automatic session timeout after inactivity
  • IP whitelisting for enhanced security

Regular Security Audits

Our platform undergoes regular security audits and penetration testing by third-party security firms to identify and address potential vulnerabilities.

Data Backup & Recovery

We maintain automated daily backups of all data with geo-redundant storage. Our disaster recovery plan ensures business continuity and data availability even in catastrophic scenarios.

Network Security

Our infrastructure includes:

  • Distributed Denial of Service (DDoS) protection
  • Web Application Firewall (WAF)
  • Intrusion Detection and Prevention Systems (IDS/IPS)
  • 24/7 security monitoring and incident response

Your Privacy Rights

You have complete control over your personal data. Under various privacy laws, you have the following rights:

Right to Access

Request a copy of all personal data we hold about you.

Right to Rectification

Correct any inaccurate or incomplete personal data.

Right to Erasure

Request deletion of your personal data ("right to be forgotten").

Right to Data Portability

Receive your data in a structured, machine-readable format.

Right to Restrict Processing

Limit how we use your personal data.

Right to Object

Object to certain types of processing, including marketing.

To exercise any of these rights, please contact us at [email protected]. We will respond to your request within 30 days.

Your Responsibilities

As a platform user, you have important responsibilities regarding data protection and privacy:

  • Implement Your Own Privacy Policy: When you provide your customers with access to features powered by our platform, you must implement and enforce your own Privacy Policy that provides at least the same level of protection as ours.
  • Obtain Customer Consent: You must obtain proper consent from your customers before collecting, using, or sharing their data through our platform.
  • Comply with Communication Laws: If you use our communication features (SMS, email, voice calls), you are exclusively responsible for compliance with TCPA, CAN-SPAM, and other applicable laws.
  • Secure Your Account: Maintain strong passwords, enable two-factor authentication, and keep your login credentials confidential.

Data Processing & Storage

Data Location: Your data is stored in secure, enterprise-grade data centers located in the United States. We use geo-redundant storage to ensure data availability and disaster recovery capabilities.

Data Retention: We retain your data for as long as your account is active or as needed to provide you services. If you close your account, we will delete your data within 90 days, except where we are required to retain it for legal or regulatory purposes.

Third-Party Services: We may use trusted third-party service providers to help us operate our platform. These providers are contractually obligated to protect your data and use it only for the purposes we specify.

Incident Response

In the unlikely event of a data breach, we have a comprehensive incident response plan:

  • Immediate containment and investigation of the incident
  • Notification to affected users within 72 hours
  • Coordination with law enforcement and regulatory authorities as required
  • Implementation of additional security measures to prevent future incidents
  • Transparent communication about the nature and scope of the breach

Contact Our Security Team

If you have questions about our security practices or want to report a security vulnerability, please contact our dedicated security team:

Security Issues: [email protected]

Privacy Inquiries: [email protected]

General Support: [email protected]

Phone: +1 (450) 990-1011

We take all security reports seriously and will respond to verified vulnerabilities within 48 hours. We appreciate responsible disclosure and may offer recognition or rewards for significant findings.