GDPR Compliant

The GDPR (General Data Protection Regulation) is a regulation designed to strengthen data protection for residents of the European Economic Area which includes the EU, Iceland, Lichtenstein, and Norway. SocketLabs offers a GDPR compliant Data Processing Addendum to our customers.

Learn More

Privacy Shield Certified

Privacy Shield is a self-certification program that enables organizations to lawfully transfer personal data from the EU and Switzerland, to the United States in support of transatlantic commerce.

Learn More

VeraSafe Verified

To qualify for this certification, SocketLabs’ online privacy policy must address the critical areas of 3rd party disclosure, private information security and email choice.

Learn More

M3AAWG Member

The Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) is where the industry comes together to work against bots, malware, spam, viruses, DoS attacks and other online exploitation. SocketLabs has been a member of M3AAWG in an ongoing effort to ensure the privacy and security of our email platform.

Learn More

CCPA Compliant

The California Consumer Privacy Act is a state law that gives California residents more control over the personal data that is collected on them. At a high level the CCPA gives California consumers the right to access, delete, and opt-out of the personal data collection.

Learn More

General Privacy Policy

We care about your privacy and trust in SocketLabs. If you want to learn about SocketLabs’ privacy, read our Privacy Policy to inform you of our practices involving data collection, use, and disclosures.

View Policy

Email Service Privacy Policy

We care about your privacy and trust in SocketLabs. If you want to learn about SocketLabs’ privacy as it relates specifically to our email service, read our Email Service Privacy Policy to learn more about our practices involving data collection, use, and disclosures.

View Policy

Committed to Keeping
Your Data Safe and Secure

SocketLabs Internal Security Policy

  • Purge, delete, or destroy data in electronic or paper form after it is no longer needed.
  • Use a change management process before carrying out any major information system change.
  • Conduct privacy and security training for all employees.
  • Patch and update information systems to protect them against vulnerabilities.
  • Periodically perform risks assessments for all information systems.
  • Perform background checks for all employees.
  • Inventory, classify, and manage information systems throughout their lifecycle.
  • Inventory, classify, and manage information systems throughout their lifecycle.
  • Grant privileges according to job responsibilities that are based on the principle of least privilege.
  • Use endpoint security solutions on information systems to help protect them against virus and malware attacks.
  • Ensure that third-party service providers have adequate security and privacy agreements.
  • Maintain backup copies of critical information systems to avoid the loss of data.
  • Secure, segment, and restrict network traffic using firewalls.

Trusted by: