Your Security at iggzy

At iggzy, protecting your business and client data is at the heart of everything we do. We use the latest industry standards, security practices, and privacy safeguards to ensure your information is always safe—so you can work with total confidence, anywhere.

Data Encryption

  • Secure Data Transmission: All information you send or receive on iggzy is protected with end-to-end encryption using HTTPS and Transport Layer Security (TLS), keeping your data secure while moving over the internet.
  • Encrypted Data Storage: Your data—including projects, invoices, and client lists—is stored using advanced AES-256 encryption on secure servers with strict access controls.

Access Control & Infrastructure

  • Role-Based Access Control (RBAC): We enforce a policy of least privilege using RBAC. Only essential, authorized iggzy team members have access to your data, and only for specific operational and support purposes. All access is logged and monitored.
  • Secure Infrastructure: Our infrastructure is built on leading cloud platforms that meet rigorous, global security standards. We adhere to a shared responsibility model to ensure security at every layer, from the physical data center to our application logic.
  • 24/7 Monitoring: Our systems are housed in professional data centers with around-the-clock monitoring, physical security, and automated alerts for any suspicious activity.
  • Regular Backups: Your information is backed up daily and stored securely in a separate, encrypted environment, ensuring business continuity in the rare event of a technical failure.

Password and Account Safety

  • Passwords Encrypted: All user passwords are cryptographically hashed and salted before storage and are never stored in plain text.
  • Account Security: We strongly recommend choosing a unique and complex password for your iggzy account. Two-factor authentication (2FA) will be supported soon for an additional layer of account security.

Commitment to Privacy

  • No Third-Party Sale: iggzy will never sell or rent your personal or business data. Your information is yours alone.
  • Trusted Partners: We work with select partners (such as payment processors) for essential services. These partners are vetted to ensure they meet our strict security and privacy standards.

Compliance & Best Practices

  • Industry Compliance: We regularly review our systems to stay aligned with leading security standards and data privacy regulations. As we grow, we are committed to achieving and maintaining key compliance certifications, such as SOC 2, to validate our security controls.
  • Continuous Improvement: Our team performs regular security audits, vulnerability scans, and code reviews. We apply software and infrastructure updates promptly to defend against emerging threats.

Questions?

Your peace of mind matters to us. If you have questions about iggzy’s security controls or need to report a concern, please contact us any time at hello@iggzy.app.