• Security and Data Privacy

    Manage data privacy, right of access, data portability, and right to erasure to comply with regulations.

  • Security and Data Privacy

    Manage data privacy, right of access, data portability, and right to erasure to comply with regulations.

Opting in

The increasing number of companies experiencing data breaches, malware attacks, and other incidents where entrusted data is at risk of being exposed has led to taking a closer look at how organizations are using the data collected and if they are keeping compliant with regulations such as the European Union General Data Protection Regulation (GDPR) or the California Consumer Privacy Act (CCPA).

Protecting Customer Data and Respecting Privacy

Lytics provides organizations with tools to adopt or implement a new framework for privacy-compliant marketing. To help mitigate security and privacy risks, technical and marketing teams need to partner in being more vigilant on what data is collected, how it is collected, from whom it is collected, how the data is stored, where and how it’s used, and who has access to it.

Marketers seeking to leverage customer data for personalization, audience segmentation, or behavioral insights need to be aware of the need to proactively address data protection and privacy requirements and understand the steps to take to prevent information from being compromised.

Keeping the data systems and infrastructure secured are critical for protecting the integrity, availability, and confidentiality of customer data. This should involve ensuring platforms with access to customer data, particularly those using personally identifiable information (PII), are audited regularly to vet the effectiveness of controls and to identify and remediate any potential vulnerabilities to reduce risk.

Protecting PII

How Lytics Protects Customer Data

Security best practices are a mandated aspect of all development activities at Lytics with risk management living at the core of the software development process. This includes evaluating the probability and impact of all vulnerabilities, changes to protect against attacks, disruption of service, and attempts to compromise the privacy, confidentiality, or integrity of customer data.

Our security features provide organizations the ability to:

Segregate duties, roles, and permissions with access controls to limit access to PII

Pseudonymize/anonymize or hash any identifier for an account

Use role-based access controls to limit access to different attributes stored on user profiles

Lytics and Security

Data Protection and Security Are Shared Responsibilities

Lytics views the protection of your data and privacy law compliance as shared responsibilities. Our customers are responsible for enacting best practices around data privacy and security for the benefit of their customers and their data.

We have implemented and maintain:

Appropriate administrative, physical, and logical data protection safeguards

Features designed to protect the security, availability, confidentiality, and integrity of customer data entrusted to Lytics

Facilitation of our customers’ compliance in accordance with applicable laws

Focused on Privacy and Delivery of Compliance-Enabling Functionality

Lytics provides a central hub for customer data, allowing each of our customers to collect personal information from their selected sources, such as a website or marketing platforms, and send the customer data to specific destinations, such as your CRM database or accounts with third-party applications or services.

We respect the privacy of the individuals whose personal information we process and their rights regarding that data. We are focused on meeting, and helping our customers meet, the requirements of a fast-changing privacy regulatory environment while providing compliance-enabling technology.

Commitment to Independent Audits and Certifications

Lytics is committed to regular, independent audits of the platform as a means of enhancing data protection and reducing the risk of a security incident. We have retained an independent accounting firm to confirm the controls we have implemented to secure our platform and customer data entrusted to us meet the Service Organization Controls (SOC) 2 Type II Trust Services Principles for Security, Availability, and Confidentiality.