Security Statement
Last updated: December 2025
Clientky ("we", "our", "us") is committed to strong information security practices, including cybersecurity, to ensure the confidentiality, integrity, and availability of assets, and protection against both external and internal threats.
This Security Statement is intended to provide you with more information about our security infrastructure and practices. In our Privacy Policy, you can find more details about how we handle the data we collect.
Information Security Policy
Clientky maintains a written information security policy that defines employee responsibilities and acceptable use of information system resources. This policy is reviewed and updated periodically as needed.
Organizational Security
Information security roles and responsibilities are defined within the organization. The security team focuses on information security, global security auditing, compliance, and defining security controls to protect Clientky's assets (People, Processes, and Technology).
Asset Management
Clientky's data and information systems assets are managed under our security policies and procedures. Authorized Clientky personnel who handle these assets must comply with procedures and guidelines defined by Clientky's security policies.
Personnel Security
Clientky employees are required to conduct themselves consistently with company guidelines, including those related to confidentiality, business ethics, appropriate use, and professional standards. All newly hired employees must sign confidentiality agreements and acknowledge Clientky's code of conduct policy.
Physical and Environmental Security
Clientky has policies, procedures, and infrastructure to handle both the physical security of its data centers and the environment from which they operate.
Our information systems and infrastructure are hosted in world-class data centers (such as Azure, AWS, or other similar providers) that are geographically dispersed to provide high availability and redundancy.
Secure Network Connections
HTTPS encryption is configured for web application access. This helps ensure that user data in transit is secure and available only to intended recipients.
Network Security
Our infrastructure servers reside behind high-availability firewalls and are monitored for detection and prevention of various network security threats. Firewalls are used to restrict access to systems from external networks and between systems internally.
Clientky maintains separate development and production environments. We ensure proper network segmentation through the establishment of security zones that control the flow of network traffic.
Software Development Lifecycle
We follow a defined methodology for developing secure software designed to increase the resilience and reliability of our products. Security and security testing are implemented throughout the entire software development methodology.
Our secure development lifecycle follows standard security practices, including vulnerability testing, regression testing, penetration testing, and product security assessments.
Data Protection
Clientky continuously works to develop products that support the latest recommended encryption suites and secure protocols for encrypting traffic while in transit. We apply a common set of personal data management principles to customer data that we may process, handle, and store.
Incident Management
Clientky has a formalized incident response plan (Incident Response Plan) and associated procedures in case of an information security incident.
Business Continuity and Disaster Recovery
We implement a disaster recovery program to minimize service disruptions due to hardware failures, natural disasters, or catastrophes.
Contact Us
If you have questions about our security practices, please contact us at: legal@clientky.app