Security
ColonyCore is built with security best practices so teams can adopt self-serve without a sales or security review call.
Security practices
?? Encryption
- In transit: Encrypted over HTTPS/TLS.
- At rest: Encryption where supported by our infrastructure and storage providers.
??? Infrastructure
- Network controls: Segmentation and firewalling where supported by the hosting environment.
- Access controls: Least-privilege access for administrative systems.
- Hardening: Regular dependency and platform updates.
?? Backups & Recovery
- Backups: Designed to support recovery from mistakes or outages.
- Recovery: Recovery objectives depend on the underlying infrastructure and incident type.
?? Monitoring & Logging
- Monitoring: Service health and error monitoring.
- Logging: Operational logs for troubleshooting and security review.
- Incident response: We investigate and remediate issues as quickly as possible.
Compliance & Regulations
Privacy rights
We aim to support common privacy expectations (access, deletion, and data handling requests) and will work with customers on reasonable requests.
Data processing agreements
If you need a DPA, subprocessor details, or a security questionnaire, contact support and we’ll provide what we can.
Certifications
We do not claim certifications on this page unless we can provide supporting documentation.
Regulated use cases
If you have regulated requirements, contact us so we can confirm fit before you rely on ColonyCore for a specific compliance program.
Data minimization
We aim to collect and retain only what’s needed to provide and improve the service.
Transparency
We keep this page intentionally conservative to avoid promises we can’t operationalize.
Data Ownership & Control
Your Data is Yours
ColonyCore is a custodian of your data. You retain ownership and control.
- We support data export in standard formats where available.
- We do not sell your data.
- Deletion requests are handled according to our policies and legal obligations.
Privacy & Tracking
See our Privacy Policy for details on data handling and tracking.
Subprocessor List
We use third-party providers to deliver the service (e.g., hosting, email, analytics). If you need a current subprocessor list, contact support.
Availability
We aim for reliable uptime, but the service may be interrupted at times. Terms of Service governs any availability commitments.
Security Questions?
If you need a DPA, security questionnaire, or have security/privacy questions, contact support.
Contact support