GDPR Compliant
The GDPR (General Data Protection Regulation) is a regulation designed to strengthen data protection for residents of the European Economic Area which includes the EU, Iceland, Lichtenstein, and Norway. SocketLabs offers a GDPR compliant Data Processing Addendum to our customers.
Learn MorePrivacy Shield Certified
Privacy Shield is a self-certification program that enables organizations to lawfully transfer personal data from the EU and Switzerland, to the United States in support of transatlantic commerce.
Learn MoreM3AAWG Member
The Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) is where the industry comes together to work against bots, malware, spam, viruses, DoS attacks and other online exploitation. SocketLabs has been a member of M3AAWG in an ongoing effort to ensure the privacy and security of our email platform.
Learn MoreCCPA Compliant
The California Consumer Privacy Act is a state law that gives California residents more control over the personal data that is collected on them. At a high level the CCPA gives California consumers the right to access, delete, and opt-out of the personal data collection.
Learn MoreGeneral Privacy Policy
We care about your privacy and trust in SocketLabs. If you want to learn about SocketLabs’ privacy, read our Privacy Policy to inform you of our practices involving data collection, use, and disclosures.
View PolicyEmail Service Privacy Policy
We care about your privacy and trust in SocketLabs. If you want to learn about SocketLabs’ privacy as it relates specifically to our email service, read our Email Service Privacy Policy to learn more about our practices involving data collection, use, and disclosures.
View PolicyCommitted to Keeping
Your Data Safe and Secure
SocketLabs Internal Security Policy
- Purge, delete, or destroy data in electronic or paper form after it is no longer needed.
- Use a change management process before carrying out any major information system change.
- Conduct privacy and security training for all employees.
- Patch and update information systems to protect them against vulnerabilities.
- Periodically perform risks assessments for all information systems.
- Perform background checks for all employees.
- Inventory, classify, and manage information systems throughout their lifecycle.
- Inventory, classify, and manage information systems throughout their lifecycle.
- Grant privileges according to job responsibilities that are based on the principle of least privilege.
- Use endpoint security solutions on information systems to help protect them against virus and malware attacks.
- Ensure that third-party service providers have adequate security and privacy agreements.
- Maintain backup copies of critical information systems to avoid the loss of data.
- Secure, segment, and restrict network traffic using firewalls.
Trusted by: