Loopio Data Privacy & Security

A Secure, Reliable Platform Experience

We’re Committed to Protecting Your Data

Maintaining the confidentiality, integrity, and availability of your data is critical to our team. As part of our ongoing commitment to putting our customers first, Loopio has built a robust and transparent data protection program.

Software That’s
Secure by Design

  • Certified by Industry Standards

    Every year, Loopio undergoes SOC 2 Type II audit by a third-party firm to ensure customers are protected across various levels.

  • Data Encryption Protection

    Whether your data is in transit or at rest, all Loopio customer data is encrypted through industry leading-standards: TLS v1.2 in transit and AES256 at rest.

  • Secure and Reliable Infrastructure

    Customer data is hosted through Amazon Web Services (SOC 1, SOC 2, and SOC 3 certified). Our web servers and databases are load-balanced across multiple availability zones.

Woman with clipboard walking down aisle of tall servers.

Enterprise Security

  • Single Sign-on Support

    Loopio offers single sign-on (SSO) through Security Assertion Markup Language (SAML) 2.0 and Google authentication. Our platform integrates with standard systems including Okta, OneLogin, as well as Microsoft Azure and ADFS.

  • Annual Penetration Testing

    We conduct third-party penetration testing on an annual basis, which includes critical security risks listed by the Open Web Application Security Project® (OWASP). This simulates a real-world cyberattack to ensure our systems and your data remain secure.

  • GDPR and CCPA Compliant

    Loopio handles personal information with compliance in mind. Our platform is General Data Protection Regulation (GDPR) compliant and meets the California Consumer Privacy Act (CCPA) standards.

Developer working on code in front of a monitor.

Restricted Access & Authorization

  • Data Segregation & Security

    Customer data is logically separated through strict coding standards, code reviews, and database design. These records also have a unique customer identifier that ensures maximum data security.

  • Access Management & Controls

    Loopio applies access controls in accordance with the ‘principle of least privilege’. Meaning that access to customer data is only granted to authorized employees who require it to perform their roles and all system access is logged.

  • Thorough System Mangement

    Loopio has extensive change management controls in place. All system changes directly impacting our customers follow rigorous planning and transparent communication.

Man typing on a laptop, with a badge with a secure lock overlaid on the image.

Proactive Security Protocols

  • Employee Privacy & Security Training

    Security is a company-wide endeavor. All employees complete an annual security training program and employ best practices when handling customer data.

  • Rigorous Policies & Procedures

    Loopio’s information security management system is based on industry best practices (ISO 27001). Through this framework, customers can trust that working with Loopio is a reliable, consistent, and secure experience.

  • Stringent Vendor Evaluations

    Loopio conducts thorough evaluations and security reviews of its vendors. We ensure that all vendors processing confidential customer data adhere to industry-leading control standards.

    Learn more about our policies on Loopio’s privacy page.

Man with laptop on conference video, with several headshots appearing on screen.

Get a Personalized
Platform Walkthrough