Your data security matters to us

When you join Creatopy, you can rest assured that your data is in safe hands. By running compliance checks, a range of security-specific features, and an enhanced level of protection, we are committed to maintaining customer trust at the core of our organization.

Keeping your data safe

Accredited and certified security protocols

Complying with international quality and security standards is our top priority. Check our latest certifications: ISO 20000-1 (IQNet and SRAC certifications), ISO 27001 (IQNet and SRAC certifications), and ISO 9001 (IQNet and SRAC certifications).

ISO 9001 certification

ISO 9001

ISO 27001 certification

ISO 27001

ISO 20000 - 1  certification

ISO 20000 - 1

Security specific features

SSO for secure access

We have implemented the single sign-on authentication (SSO) to diminish data breaches and password-related incidents. Enjoy an enhanced level of security, quick sign-ins, and no more 'Forgot your password' prompts.

Safe collaboration

Share your work through a simple share link without worrying about creating new accounts. Make your feedback and share links public or private, depending on who you collaborate with.

Granular permissions

You have full control over the access levels. Assign different roles and rights to your team, depending on how much visibility and permissions you want to grant to each one, whether admin, editor, or viewer.

How we deal with personal data protection

Creatopy is committed to treating employee and customer personal data following the main privacy laws and regulations, such as the GDPR and the CCPA.

Protection of your data

What else we do to secure your data

Password storage and hosting

We use the bcrypt algorithm to securely store Creatopy credentials. We host our services and data in Amazon Web Services (AWS) facilities in the United States (us-east-1 region).

Failover and disaster recovery

As our infrastructure and data are spread across three AWS availability zones, you can rest assured that there is always a connection backup if one of the data centers fails.

Virtual private cloud

Our servers are located within our own secure and isolated virtual private cloud (VPC) protected by network access control lists (ACLs).

Multi-factor authentication

To ensure safe access to cloud services, we have implemented 2-factor authentication (2FA) and strong password practices on Google, AWS, and other tools we use daily.

Data encryption

Our data is encrypted in transit with 256-bit encryption. Our platform endpoints are TLS/SSL only, with an A+ rating on Qualys SSL Labs' tests. We only use strong cipher suites and fully enable HSTS and Perfect Forward
Secrecy features.

Incident response

We handle security events using an internal protocol that includes escalation procedures, rapid mitigation, and post-mortem. All employees are aware of the policies.

Do you want to learn more about our
security systems?

If you have any questions about the practices we use to protect customer data, please get in
touch with us.