At Akia, we take security seriously. We map our security program to industry standards such as ISO 27001 and the CIS Critical Security Controls. Not only are we looking for ways to improve the security of our product, but also with how we conduct our daily business.
Using tools and regular testing procedures, we ensure that every employee is compliant with our security policies and that they understand the role they play in securing Akia.
While we believe that security is everyone's responsibility, our program is led by our Chief Technology Officer
Akia stores the following customer data in its cloud:
- Email addresses
- Payment history and invoices (credit card data is stored and processed by Stripe)
- Phone Number
- Job Title
- Customer Names
- Customer Emails (optional)
- Customer Phone Numbers
- Customer Appointment Dates
- Customer Communication
- Customer 3rd Party Chat Application Identifiers (Facebook ID, WeChat Username, etc)
Data captured or collected within the Akia platform is never sold to third parties.
SSL Encryption is used throughout Akia to protect PII and non-public data from unauthorized access.
All communication between Akia users and the Akia-provided applications are encrypted-in-transit while using the application.
All databases and database backups are encrypted at rest.
Customers can request all of their data, or have it deleted by sending an email to: email@example.com
as long as it is not subject to a legal hold or investigation.
Once an account is deleted, all associated data, conversations are removed from the system. This action is irreversible.
Customer data is limited to only those with roles that require access to perform their job duties. An example of this is our Support team.
At Akia, we use 3rd party services
to help with analytics, payments, sending transactional emails and for hosting our service. All 3rd party services undergo a due diligence check to ensure your data stays secure. The data provided to these services is limited to the minimum required to perform their processing duties.
Our backend infrastructure is hosted in GCP and is fully monitored to detect any downtime.
Akia conducts 3rd party pentests at least quarterly. In addition to regular pentesting, we also use scanning tools to monitor and detect vulnerabilities.
If you believe you have discovered a vulnerability within Akia's application, please submit a report to us by emailing firstname.lastname@example.org
If you believe your account has been compromised or you are seeing suspicious activity on your account please report it to email@example.com