Your data is safe with Finsweet
Finsweet Account and Wized are fully SOC2 compliant, according to our auditor's latest report.
That being said, our security policies are enforced company-wide, so you can be sure that all data at Finsweet meets our highest security level.
SOC 2 Type II
SOC 2 (System & Organization Controls) is a compliance framework used to evaluate and validate an organization’s information security practices, particularly in the SaaS industry.
SOC 2 was created by AICPA (American Institute of Certified Public Accountants) as a way to help organization’s verify their security, processing integrity, confidentiality and privacy; thus reducing the risk of a security breach.
3rd-party auditors annually assess Finsweet’s information security against five categories, known as the five Trust Services Criteria (TSC).
If you want to view Finsweet’s SOC 2 Type II report, please submit a request.
Finsweet Information Security Program
Our policies are based on the following foundational principles
Access management
Access review
Device security
Personnel security
Security education
Finsweet Product Security
We follow these policies across all Finsweet products
Security in our cloud service providers
User accounts are managed via Auth0, making use of its SSO capabilities to provide a safe and unified login experience across all our products with a single user account.
Security in our products
- Role based permissions
- Backups and versioning
Customer data privacy
- Names
- Usernames and email addresses
- Billing Email Address
- Payment history and invoices (credit card data is stored and processed by Stripe)
- Phone Number (optional)
- Billing address
- Company (optional)
- Location (city, country) (optional)
- Personal Website (optional)
- Referred By (optional person who referred user to use a Finsweet product)
Finsweet’s products use a range of third-party service providers to assist with its data processing, customer engagement, and analytic activities. The type of data that the Subprocessor has access to is limited to only what is reasonably necessary to perform the service provided.
If you’re using Wized, please refer to our Subprocessor page for more information on the list.
Encryption
All communication between Finsweet product users and the product-provided web application is encrypted-in-transit using TLS while using the application.
All databases and database backups are encrypted at rest.
Data retention
Once an account or project is deleted, all associated data (account settings, etc.) are removed from the system. This action is irreversible.
Access to data
3rd party sub-processors
All 3rd party services undergo a due diligence check to ensure your data stays secure. The data provided to these services is limited to the minimum required to perform their processing duties.
Infrastructure availability
Check out our Finsweet status page or our Wized status page for more information.
Security scans
Responsible disclosure
Finsweet does not participate in a public bug bounty program at this time, nor do we provide monetary rewards for publicly reported findings.
If you believe your account has been compromised or you are seeing suspicious activity on your account please report through our Finsweet Products Support page.
Contact
If you need more information regarding security at Finsweet, please submit a request and our team will contact you.