Data Security

You cannot be paranoid enough when it comes to security. We are as paranoid as you are about securing your data at We follow the security best practices with rigour. The following details outline how we deal with your data, passwords and other sensitive information. If you have any concerns or need clarifications, please write to [email protected].

What happens once I connect my payment processor?

Once you connect your payment processor over secure channels, our automated algorithms will fetch and crunch your payments data to give you metrics and actionable intelligence. You can view a demo of our product here or write to us at [email protected]

What kind of access do you request for my payment processor account?

We request read only access to your account where the provider makes it available. This will ensure that we can never charge your customers even by mistake or because of a software bug.

What data will you access about my customer?

Since we provide rich profiling, loyalty scoring and segmentation based on your customer data, our algorithms access the following data whenever available.

Data Example Reason
Email ID [email protected] Used to identify the customer for profiles, segmentation and slice and dice
User ID 12345 Used to identify the customer in case the email is not available
City San Francisco Used as a dimension, to enable slice and dice of your metrics
CC Brand Visa Used as a dimension, to enable slice and dice of your metrics
CC Funding Type Credit Used as a dimension, to enable slice and dice of your metrics
CC Expiry 6/20 Used to generate customer score and to predict potential payment failures
CC Method Card Used as a dimension, to enable slice and dice of your metrics
Our algorithms NEVER read the credit card numbers of your customers for any reason. You can see this data in action in our demos.

Who has access to my data?

All your data is processed by automated algorithms and stored in secure databases. None of our staff will have access to your data unless required for specific support reasons or fixing security issues. We mostly work with our own simulated data sets to recreate and fix any issues. However, in certain cases where staff must access the data in order to perform support, we will get your explicit consent each time, except when responding to a critical security issue or suspected abuse. When working a support issue we do our best to respect your privacy as much as possible, we only access the minimum data needed to resolve your issue. Lastly, has a very lean team thereby limiting the count of people who provide support.

Where do you store the data? runs on cloud infrastructure provided by reputable cloud service providers like Amazon Web Services, Google Cloud Engine etc. Please refer to their websites to view more details about how they function. Email service used for exchanging information with you is provided by Google Apps for Work.

Is my interaction with secure?

All access to website is restricted to HTTPS encrypted connections using SSL/TLS transport layer encryption. All data retrieval from payment processors we integrate with is done with your unique access tokens/API Keys over a secure connection with the respective app's official API.

How is my account access protected?

Access to your account is restricted to you and others who has your access credentials like user id and password. User passwords are hashed using secure hashing algorithms. They are never stored in plain text and are not readable by others. Passwords provide access to the website where the data can be viewed or downloaded and the onus is on the end users to protect their password with care. We strongly discourage you from sharing your password with anybody else.

How will you process my financial data?

When you purchase subscription, your credit card data is neither transmitted through nor stored on our systems. Instead, we depend on PCI/DSS compliant third party Payment Gateways and Banks for doing this task.