This policy describes how Sensify Link protects customer information and the security measures used to keep service data confidential.
Effective date: April 7, 2026
Introduction
In the current digital environment, protecting confidential information is a priority for both organizations and individuals.
Sensify Link is a Sensify product, and we are committed to protecting customer information and handling it with appropriate confidentiality and security safeguards.
This document gives a high-level view of the measures used by Sensify Link to protect service data and related confidential information.
Confidentiality obligations
For this policy, confidential information may include customer data, documents, technical specifications, designs, know-how, algorithms, models, methods, strategies, business plans, customer names, and other information related to the customer business, technology, or operations that is disclosed during the service relationship.
Sensify Link commits to maintain the confidentiality of customer confidential information and not to share or sell it without prior authorization, except where disclosure is required to provide the service or comply with law.
We apply reasonable security measures designed to protect confidential information against unauthorized access, use, or disclosure.
Information security in Sensify Link
The information lifecycle covers the full period in which data exists in our systems. In Sensify Link, data may originate from user activity, connected services, uploaded content, or other product workflows enabled by the customer.
That information is transmitted and stored using security controls aligned with common industry practices, including encrypted transport where applicable and restricted infrastructure access.
Service data may be stored in isolated environments and private network configurations that are not publicly exposed.
Reference security diagram.
Isolated data environments
Sensify Link may use segregated storage and logical isolation measures to keep customer information separated and protected within the platform environment.
Depending on the architecture in use, data may be stored in relational or non-relational systems selected for availability, integrity, and security needs.
Cloud security services
Sensify Link may rely on cloud security controls made available by hosting providers such as identity and access management, private networks, encryption in transit and at rest, audit logging, and network-level traffic restrictions.
These controls help ensure that only authorized personnel and systems can access protected service resources.
Additional safeguards
Additional measures may include restricted access for authorized personnel, confidentiality commitments, firewall protections, intrusion detection, security monitoring, and alerting processes intended to identify suspicious activity quickly.
We review and evolve these measures over time based on operational needs, risk, and platform changes.
Updates
We may update this policy from time to time. When changes are material, we may provide additional notice through the product or other appropriate channels.