Security & Compliance
Learn how Slicker ensures the security and compliance of your data
At Slicker, we prioritize the security and compliance of your data to provide you with peace of mind and ensure that your sensitive information is protected at all times. Below, we outline the key measures and practices we implement.
Data Isolation
We ensure strict data segregation by using separate data stores for each client. This approach guarantees that your data remains isolated and secure, preventing unauthorized access between clients.
Encryption
To safeguard your data:
- Encryption at Rest: All stored data is encrypted using industry-standard algorithms to protect it from unauthorized access.
- Encryption in Transit: We use secure protocols such as HTTPS to encrypt data transmitted between our systems and your applications.
These measures help ensure your data remains protected throughout its lifecycle.
Role-Based Access Control (RBAC)
Slicker implements role-based access control to manage permissions effectively:
- Administrator Access: Users can manage the organization, including adding or removing users.
- Viewer Access: Users have read-only access to view data without making changes.
This ensures that only authorized personnel can access sensitive areas of your account. For more details, see Account Setup.
Incident Response and Security Reporting
Slicker has a robust incident response plan to quickly detect, address, and mitigate any security issues.
- Incident Handling: We continuously monitor for security threats and maintain a structured protocol for managing incidents.
- Client Notification: In the unlikely event of a security breach, we promptly notify affected clients with actionable steps.
If you discover a vulnerability or have security concerns, please report them to us at security@slickerhq.com. We value your input in maintaining a secure environment.
Policy Reviews and Availability
Our security policies are reviewed regularly to stay compliant with evolving standards and best practices.
- On-Demand Access: Clients can request copies of our policies for review by their security teams. To request access, please contact us.
These frequent reviews ensure that we remain proactive in addressing new threats and meeting the latest compliance requirements.
Compliance
We are committed to meeting the highest industry standards for compliance:
- SOC 2 Compliance: Slicker is actively working towards achieving SOC 2 certification, demonstrating our dedication to robust security, availability, and confidentiality practices.
Your trust is our top priority, and we continually review and enhance our security and compliance measures to stay ahead of evolving threats. If you have any questions or require more information, please don’t hesitate to contact us.