All Collections
Security
Security Statement
Security Statement

We are transparent about our security infrastructure and practices to help reassure you that your data is appropriately protected.

Lisa Abbott avatar
Written by Lisa Abbott
Updated over a week ago

Millions of users have entrusted Wootric by InMoment with their survey data, and we make it a priority to take our users’ security and privacy concerns seriously. We strive to ensure that user data is kept securely and that we collect only as much personal data as is required to provide our services to our customers in an efficient and effective manner.

Wootric uses some of the most advanced technology for Internet security that is commercially available today. This Security Statement is aimed at being transparent about our security infrastructure and practices, to help reassure you that your data is appropriately protected.

Overview

Wootric will maintain administrative, physical, and technical safeguards for protection of the security, confidentiality and integrity of personal data processed by its service, as follows:

  • Security policies are reviewed and approved by executive leadership. 


  • Security systems and processes are regularly reviewed and tested by security staff and third parties. 


  • Use of network firewalls and Web Application Firewall (WAF) to protect Customer Data accessible via the Internet is required. 


  • Physical access to systems containing Customer Data is restricted. 


  • System access is based on the principle of least privilege, separation of duties, and is regularly reviewed. 


  • Applicable and necessary security patches are kept up-to-date. 
 


  • Use of default system passwords is prohibited and the use of “strong passwords” is mandated on all systems.

  • Employees receive annual security awareness training and must sign confidentiality agreements as a condition of employment. 


  • Remote access to the Service Operations Environment is restricted and requires two factor authentication.

Access Limitations 


  • Wootric by InMoment restricts access to Customer Data only to those employees who have a need to know or otherwise access 
Customer Data to enable Wootric to perform its obligations under the Agreement; provided that (a) a background check has been conducted of those employees, and (b) those employees are bound in writing by obligations of confidentiality sufficient to protect the Customer Data in accordance with requirements herein. 
 


  • Wootric by InMoment maintains a disciplinary process to address any unauthorized access, use or disclosure of Customer Data. 
 


Customer Data Transmission 
 


  • All access into the Service utilizes secure protocol HTTPS; All clear text HTTP connections are disabled by default. 


  • Copying of Customer Data outside of the SaaS Operations Environment by any employee is restricted by policy and only 

permitted for legitimate business need. 


  • Customer Data is transmitted via secure TLS exclusively; SSL is disabled by default.

  • Except for transmissions initiated by Customer through the use of the SaaS Service, Wootric by InMoment does not transmit directly or 

indirectly, any Customer Data in any form to any country outside of the United States. [except where Data Importer’s sub-contractors and remotely].

Data Storage, Retention and Availability 


  • Wootric by InMoment does not store or process Customer Data in any form outside of the United States, other than for transit 
purposes, without the prior written consent of Customer. Notwithstanding the foregoing, Customer consents to access to its 
accounts for the purposes of providing support by any personnel located outside of the United States. 


  • Customer Data retention timelines are defined for all elements of the Service. 
 


  • Wootric by InMoment will ensure back up of the Customer Data on a daily basis onto an electronic storage medium and shall store all 
such backups in separate geographic location. Customer Data is transmitted using secure protocols, on dedicated link, and stored in a secured facility for backup. 


Security Breach Response 


Despite best efforts, no method of transmission over the Internet and no method of electronic storage is perfectly secure. We cannot guarantee absolute security.

  • Wootric by InMoment maintains a security incident response plan and a team of personnel trained to identify, investigate, and respond 
to security issues.

  • In the event of a Security Breach impacting Customer Data, Wootric by InMoment shall: 
(a) take immediate steps to remedy the breach;
(b) notify Customer as soon as is practicable; and
(c) take any other prompt actions towards prevention of any additional Security Breach. 
In any notification to Customer, Wootric by InMoment shall provide a description of the incident, the data accessed, the identity of affected third parties, if any, and such other relevant information determined by Wootric by InMoment, and
 designate a single individual as a point of contact for Customer.

Wootric by InMoment agrees to cooperate with Customer and any law enforcement or regulatory official in connection with any Security Breach, including without limitation any investigation, reporting or other obligations required by applicable law, as well as any dispute, inquiry, or claim concerning the Security Breach. For purposes of this subsection, “Security Breach” means any actual unauthorized use, access, disclosure or misuse of Customer Data of which Wootric becomes aware.


Trust Service Principles

  • Data center providers for Wootric SaaS Operations Environment maintain an AT101 SOC2 Type 2 report or any successor standard.

SaaS Operations Management

  • Wootric by InMoment maintains and follows change management processes. All changes to the production environment are risk- 
assessed, logged, and approved. Releases to the production environment are promoted through a pre-production test 
environment. 
 


  • The operations environment is separate from the development and staging environments. All SaaS environments are separate 
from the corporate IT environment. 


  • Logical access to the Service infrastructure is restricted using the principles of least privilege and need to know. 


  • Access to all systems is controlled by an authentication method involving a minimum of a unique user ID/password 
combination. Privileged users and administrators must use strong authentication. 


  • Remote network access, where available, is secured by two-factor authenticated VPN. 


  • The Service is hosted in the United States in a Tier 3 SOC 2 Type 2 certified computing facility equipped with fully redundant 
power backup and fire suppression systems, 24-7 security guards, mantraps, controlled access, biometric authentication, and video surveillance. 


System Protection 


  • Wootric by InMoment protects its computer and operations systems using standard industry methods designed to prevent outages and 
minimize impacts during any unavoidable service interruptions. 


  • Security relevant events, including, login failures, use of privileged accounts, changes to access models or file permissions, 
modification to installed software, or operating systems, changes to user permissions or privileges or use of any privileged system function, are logged on all systems.

Your Responsibilities

Keeping your data secure also depends on you ensuring that you maintain the security of your account by using sufficiently complicated passwords and storing them safely. You should also ensure that you have sufficient security on your own systems, to keep any survey data you download to your own computer away from prying eyes. We offer SSL to secure the transmission of survey responses, but it is your responsibility to ensure that your systems are configured to use that feature where appropriate.

We welcome any questions you may have. Please contact us.

Did this answer your question?