Governance
Emailr establishes policies and controls, monitors compliance with those controls, and proves the security and compliance to third-party auditors. Our policies are based on the following foundational principles:Least Privilege
Access should be limited to only those with a legitimate business needs,
based on the principle of least privilege.
Consistency
Security controls should be applied consistently across all areas of the
enterprise.
Defense in Depth
Security controls should be implemented and layered according to the
principle of defense-in-depth.
Continuous Improvement
The implementation of controls should be iterative, continuously improving
effectiveness and decreasing friction.
Compliance Standards
SOC 2 Type II
SOC 2 Type II
Emailr is SOC 2 Type II compliant. The audit was completed by Vanta & Advantage Partners.
You can download a copy of the report on the Documents page.
GDPR
GDPR
Emailr is GDPR compliant. You can learn more about our GDPR compliance or view our DPA.
Data Protection
Data at rest
All datastores are encrypted at rest. Sensitive collections and tables also
use row-level encryption.
Data in transit
Emailr uses TLS 1.3 or higher everywhere data is transmitted over
potentially insecure networks.
Data backup
Emailr backs-up all production data using a point-in-time approach. Backups
are persisted for 30 days, and are globally replicated for resiliency
against regional disasters.
Product Security
Penetration testing
Emailr engages with third-party firms to conduct penetration testing at least annually. All areas of the Emailr product and cloud infrastructure are in-scope for these assessments, and source code is fully available to the testers in order to maximize the effectiveness and coverage. You can download the latest penetration test report on the Documents page.Vulnerability scanning
Emailr uses multiple vulnerability monitoring techniques including code-level scanning, dependency scanning, and security reviews to identify and remediate vulnerabilities. Vulnerabilities are prioritized based on severity and risk, and are remediated according to the following schedule:- Critical: 15 Days
- High: 30 Days
- Medium: 90 Day
- Low: 180 Days
- Informational: As needed
Enterprise Security
Endpoint protection
All company devices are equipped with anti-malware protection. Endpoint security alerts are monitored with 24/7/365 coverage. We use MDM software to enforce secure configuration of endpoints, such as disk encryption, screen lock configuration, and software updates.
Security education
Emailr provides comprehensive security training to all employees upon onboarding and annually.Emailr’s conducts threat briefings with employees to inform them of important security and safety-related updates that require special attention or action.
Identity and access management
Emailr employees are granted access to applications based on their role, and automatically deprovisioned upon termination of their employment. Further access must be approved according to the policies set for each application.Multi-factor authentication is required for all employees to access company applications.