Loopio Data Privacy & Security

A Secure, Reliable Platform Experience

We’re Committed to Protecting Your Data

Maintaining the confidentiality, integrity, and availability of your data is critical to our team. As part of our ongoing commitment to putting our customers first, Loopio has built a robust and transparent data protection program.

Software That’s
Secure by Design

Certified by Industry Standards

Every year, Loopio undergoes SOC 2 Type II audit by a third-party firm to ensure customers are protected across various levels.

Stack icon

Data Encryption Protection

Whether your data is in transit or at rest, all Loopio customer data is encrypted through industry leading-standards: TLS v1.2 in transit and AES256 at rest.

Infrastructure icon

Secure and Reliable Infrastructure

Customer data is hosted through Amazon Web Services (SOC 1, SOC 2, and SOC 3 certified). Our web servers and databases are load-balanced across multiple availability zones.

Woman with clipboard walking down aisle of tall servers.

Enterprise Security
Standards

Single sign-on icon

Single Sign-on Support

Loopio offers single sign-on (SSO) through Security Assertion Markup Language (SAML) 2.0 and Google authentication. Our platform integrates with standard systems including Okta, OneLogin, as well as Microsoft Azure and ADFS.

Annual Penetration Testing

We conduct third-party penetration testing on an annual basis, which includes critical security risks listed by the Open Web Application Security Project® (OWASP). This simulates a real-world cyberattack to ensure our systems and your data remain secure.

GDPR and CCPA Compliant

Loopio handles personal information with compliance in mind. Our platform is General Data Protection Regulation (GDPR) compliant and meets the California Consumer Privacy Act (CCPA) standards.

Developer working on code in front of a monitor.

Restricted Access & Authorization

Data segregation icon

Data Segregation & Security

Customer data is logically separated through strict coding standards, code reviews, and database design. These records also have a unique customer identifier that ensures maximum data security.

Access Management & Controls

Loopio applies access controls in accordance with the ‘principle of least privilege’. Meaning that access to customer data is only granted to authorized employees who require it to perform their roles and all system access is logged.

Computer icon

Thorough System Mangement

Loopio has extensive change management controls in place. All system changes directly impacting our customers follow rigorous planning and transparent communication.

Man typing on a laptop, with a badge with a secure lock overlaid on the image.

Proactive Security Protocols

Employee Privacy & Security Training

Security is a company-wide endeavor. All employees complete an annual security training program and employ best practices when handling customer data.

Policies icon

Rigorous Policies & Procedures

Loopio’s information security management system is based on industry best practices (ISO 27001). Through this framework, customers can trust that working with Loopio is a reliable, consistent, and secure experience.

Vendor evaluations icon

Stringent Vendor Evaluations

Loopio conducts thorough evaluations and security reviews of its vendors. We ensure that all vendors processing confidential customer data adhere to industry-leading control standards.

Learn more about our policies on Loopio’s privacy page.

Man with laptop on conference video, with several headshots appearing on screen.

Get a Personalized
Platform Walkthrough