Effective date: April 7, 2026

Introduction

In the current digital environment, protecting confidential information is a priority for both organizations and individuals.

Sensify Link is a Sensify product, and we are committed to protecting customer information and handling it with appropriate confidentiality and security safeguards.

This document gives a high-level view of the measures used by Sensify Link to protect service data and related confidential information.

Confidentiality obligations

For this policy, confidential information may include customer data, documents, technical specifications, designs, know-how, algorithms, models, methods, strategies, business plans, customer names, and other information related to the customer business, technology, or operations that is disclosed during the service relationship.

Sensify Link commits to maintain the confidentiality of customer confidential information and not to share or sell it without prior authorization, except where disclosure is required to provide the service or comply with law.

We apply reasonable security measures designed to protect confidential information against unauthorized access, use, or disclosure.

Information security in Sensify Link

The information lifecycle covers the full period in which data exists in our systems. In Sensify Link, data may originate from user activity, connected services, uploaded content, or other product workflows enabled by the customer.

That information is transmitted and stored using security controls aligned with common industry practices, including encrypted transport where applicable and restricted infrastructure access.

Service data may be stored in isolated environments and private network configurations that are not publicly exposed.

Reference diagram for Sensify security and data flow
Reference security diagram.

Isolated data environments

Sensify Link may use segregated storage and logical isolation measures to keep customer information separated and protected within the platform environment.

Depending on the architecture in use, data may be stored in relational or non-relational systems selected for availability, integrity, and security needs.

Cloud security services

Sensify Link may rely on cloud security controls made available by hosting providers such as identity and access management, private networks, encryption in transit and at rest, audit logging, and network-level traffic restrictions.

These controls help ensure that only authorized personnel and systems can access protected service resources.

Additional safeguards

Additional measures may include restricted access for authorized personnel, confidentiality commitments, firewall protections, intrusion detection, security monitoring, and alerting processes intended to identify suspicious activity quickly.

We review and evolve these measures over time based on operational needs, risk, and platform changes.

Updates

We may update this policy from time to time. When changes are material, we may provide additional notice through the product or other appropriate channels.