We protect your data so you can protect your revenue
Signals handles sensitive operational insight. We do not need end user personal data to deliver value, and we treat the data you share with the same care as a production system inside your own stack.
Data model
Signals focuses on account level activity, health scores and risk indicators. You can choose what to sync and avoid sending personal identifiers if your policies require it.
Encryption
All data is encrypted in transit using TLS and encrypted at rest by our hosting provider. Keys and secrets are stored in managed secret stores, not in code.
Separation
Each customer workspace is isolated at the data layer. Access is controlled by strict application level checks and least privilege access for internal tools.
Infrastructure
Signals runs on a modern managed cloud platform in Europe, with separate environments for production, staging and demo.
- • Managed database with automatic backups and point in time restore
- • Network level controls and hardened base images
- • No shared root access and no unmanaged servers
Access control
Access to production systems is tightly restricted and audited.
- • Access limited to a small engineering group
- • Multi factor authentication enforced for core systems
- • Principle of least privilege for roles and permissions
- • No direct database access for customers or third parties
Integrations and data flow
Signals connects to tools like CRM, support platforms and communication systems using scoped API keys or OAuth.
- • Read focused permissions wherever possible
- • No bulk writes into your systems without clear consent
- • Event data is pulled, normalised, scored and stored per workspace
Application security
We ship small, frequent changes and keep a strong focus on basic hygiene.
- • Dependency monitoring and regular updates
- • Static checks as part of the build pipeline
- • Role based access in the product for teams and workspaces
Incident response
If something does go wrong, we want you to know what happened and what we did about it.
- • Defined severity levels and response playbooks
- • Monitoring on uptime and core workflows
- • Root cause analysis for material incidents
- • Direct communication with affected customers
Future compliance
As Signals grows, formal certification becomes part of the plan rather than an afterthought.
- • Independent penetration testing before wider rollout
- • Preparation for SOC 2 Type I followed by Type II
- • Clear documentation for security and procurement reviews
Data ownership and usage
You own your data. Signals only uses your information to calculate health scores, generate alerts and power the features you turn on.
- • No sale of customer data
- • No use of your data for advertising
- • Retention aligned to your contract and reasonable operational needs
Security questions
Need more detail for a security review, DPA or vendor assessment pack?
Email us at [email protected].
We can provide architecture diagrams, data flow details and answers tailored to your internal process.
