Platform
TOOLS & FEATURES
Conversational CX
Hubtype enterprise chatbot UI showing messaging channels and a car damage assessment tool with action button.
Automation
Hubtype chatbot platform UI: Initiates luggage selection flow with text prompts, detecting intent for cabin or hold bag.
Helpdesk
Hubtype chatbot interface showing customer chat queue and active conversation about loans and credit, enhancing enterprise support.
Solutions
channels
WhatsApp
Hubtype chatbot interface on mobile shows a user selecting a vehicle claim category with aviation-themed UI, enhancing engagement.
industries
Airlines
Insurance
Banking
eCommerce
FEATURED SUCCESS STORY
How Wizz Air transformed customer service with automation in just 8 weeks
Wizz Air aircraft in flight with distinctive pink and white livery featuring transparent Wizz logo overlay against blue sky background.
Resources
Resources
Content hub
Blog
Books
Videos
Calculators
FEATURED BLOG POSTS
3 Great Examples of Companies Using WhatsApp for Customer Service
Conversational app interface with chat, map, and payment options; Hubtype branding.
Why Switching WhatsApp Automation Providers is Easier—and More Important—Than You Think
Man looking at sticky notes on glass wall with a WhatsApp message overlay saying, “Is your WhatsApp automation provider meeting your expectations?”.
PartnersSuccess Stories
Language
English
en
Español
es
Contact UsLog In
Contact UsLog In

Security Policy

Our security policy was last updated on December 18, 2024.

This security policy outlines the information security framework for Hubtype and its commitment to protect the confidentiality, integrity, and availability of its information assets. The policy applies to all employees, contractors, and third-party vendors who handle or have access to Hubtype's information assets.

Hubtype's security committee is responsible for defining goals and objectives focused on performance evaluation regarding information security and compliance with current legislation regarding information systems, as well as for continuously improving our activities, which are regulated by the management system that develops this policy. Management is responsible for providing the necessary resources and support to implement and maintain the security policy.

Information security policy framework

Hubtype has established a comprehensive information security policy framework that includes regular risk assessments, implementation of appropriate security controls, incident management, and compliance with relevant regulations and standards.

Asset management

Hubtype has a formal process for identifying, classifying, and protecting its information assets. This process includes regular review and updates to ensure the ongoing protection of critical information assets.

Human resource security

Hubtype performs security awareness and training programs for all employees and contractors to ensure that they understand their roles and responsibilities in maintaining the confidentiality, integrity, and availability of information assets.

Communications

Employees, contractors and vendors of Hubtype must follow the secure communication process to ensure that information is transmitted securely.

Access control

Hubtype has implemented access control processes following the Least Access Privilege approach to ensure minimum permissions and only authorized individuals have access to its information assets. This includes user registration, authentication, and authorization processes.

Infrastructure security

All components are defined using Infrastructure as Code (IaC) and the source code must be reviewed taking into consideration the confidentiality, integrity and availability of the data before adding the code in production. Hubtype has monitoring of the critical components and alarm systems to make sure an on-call person is notified if any irregularity happens.

Application security

All the source code must be reviewed taking into consideration the confidentiality, integrity and availability of the data. It also must follow the coding standards established in Hubtype and pass all the tests. Moreover, we have static analysis set in place and image scanning to detect any vulnerability.

Customer data security

Hubtype uses TLSv1.2 to ensure data security in transit and SHA-256 encryption for data at rest. We also have resilience by maintaining a second replica of our databases ready for use and employing multi-AZs in our critical components. All our critical providers processing or storing PII or data considered sensitive are GDPR compliant.

Roles and Responsibilities for Information Encryption

To ensure accountability and proper implementation of encryption practices, the following roles and responsibilities are defined:

  • Data Protection Responsible (DPR):
    • Ensures that all data protection and security practices align with data privacy regulations and policies.
    • Acts as a liaison between the company and regulatory bodies regarding encryption compliance.
  • Technical Security Manager:
    • Oversees the implementation and management of encryption policies.
    • Ensures compliance with regulatory standards (e.g., GDPR) regarding data encryption.
    • Periodically reviews and updates encryption protocols to address emerging threats.
    • Acts as the owner of encryption keys, responsible for securely storing them and granting access to other team members when needed.
  • Engineering Teams:
    • Implement and maintain encryption technologies (e.g., TLSv1.2 for data in transit, SHA-256 for data at rest).
    • Conduct regular testing to ensure encryption methods are operational and effective.
    • Collaborate with the Technical Security Manager to address identified vulnerabilities in encryption mechanisms.
  • IT Operations Team:
    • Manages and monitors the resilience features, including database replicas and multi-AZ configurations.
    • Ensures that encryption keys are securely stored and rotated as per policy requirements.
  • All Employees:
    • Adhere to organizational policies regarding data handling and encryption.
    • Report any suspected security breaches or vulnerabilities immediately to the IT Security Team.

Regular training and audits are conducted to ensure all roles are equipped to handle their responsibilities effectively and to maintain the highest standards of data security.

Incident management

Hubtype has established an incident management process to respond to and report security incidents, including data breaches, network intrusions, and system failures.

Business continuity management

Hubtype has a business continuity plan in place to ensure the continuity of business operations in the event of a security breach or disruption.

Compliance

Hubtype is committed to complying with relevant legal and regulatory requirements, as well as industry standards and best practices, including ISO 27001.

Review and revision

Hubtype regularly reviews and revises its security policy to ensure its effectiveness and alignment with organizational needs. This review is conducted at least annually or as necessary based on changes in the information security environment.

Join our newsletter

Stay up to date on features and releases.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
By subscribing you agree to our Privacy Policy and consent to receive updates.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
By subscribing you agree to with our Privacy Policy and provide consent to receive updates from our company.
Platform
Conversational CXAutomation PlatformHelpdeskBotonic
Solutions
WhatsAppAirlinesInsuranceBankingeCommerce
Resources
Content HubSuccess StoriesBlogVideosBooksCalculators
Company
Contact UsWork with UsPartners
Language
English
en
Español
es
Privacy PolicyTerms and ConditionsCookie PolicySecurity Policy
© XXXX Hubtype. All rights reserved.