Security

ColonyCore is built with security best practices so teams can adopt self-serve without a sales or security review call.

Contact Us

Security practices

?? Encryption

  • In transit: Encrypted over HTTPS/TLS.
  • At rest: Encryption where supported by our infrastructure and storage providers.

??? Infrastructure

  • Network controls: Segmentation and firewalling where supported by the hosting environment.
  • Access controls: Least-privilege access for administrative systems.
  • Hardening: Regular dependency and platform updates.

?? Backups & Recovery

  • Backups: Designed to support recovery from mistakes or outages.
  • Recovery: Recovery objectives depend on the underlying infrastructure and incident type.

?? Monitoring & Logging

  • Monitoring: Service health and error monitoring.
  • Logging: Operational logs for troubleshooting and security review.
  • Incident response: We investigate and remediate issues as quickly as possible.

Compliance & Regulations

Privacy rights

We aim to support common privacy expectations (access, deletion, and data handling requests) and will work with customers on reasonable requests.

Data processing agreements

If you need a DPA, subprocessor details, or a security questionnaire, contact support and we’ll provide what we can.

Certifications

We do not claim certifications on this page unless we can provide supporting documentation.

Regulated use cases

If you have regulated requirements, contact us so we can confirm fit before you rely on ColonyCore for a specific compliance program.

Data minimization

We aim to collect and retain only what’s needed to provide and improve the service.

Transparency

We keep this page intentionally conservative to avoid promises we can’t operationalize.

Data Ownership & Control

Your Data is Yours

ColonyCore is a custodian of your data. You retain ownership and control.

  • We support data export in standard formats where available.
  • We do not sell your data.
  • Deletion requests are handled according to our policies and legal obligations.

Privacy & Tracking

See our Privacy Policy for details on data handling and tracking.

Subprocessor List

We use third-party providers to deliver the service (e.g., hosting, email, analytics). If you need a current subprocessor list, contact support.

Availability

We aim for reliable uptime, but the service may be interrupted at times. Terms of Service governs any availability commitments.

Security Questions?

If you need a DPA, security questionnaire, or have security/privacy questions, contact support.

Contact support