Features | Security & Compliance
BrainStorm is dedicated to protecting customer information. We employ gold-standard technology and abide by strict security practices to protect your data and privacy, ensuring the highest standards of protection for our customers.
Industry-leading technical controls and processes: rotating encryption keys, role-based access control (least privilege framework), encryption, and anonymization
Admins determine permitted active session length for their users
BrainStorm adheres to rigorous industry standards, including SOC 2 Type 2, ISO/IEC 27001, and the EU-US Data Privacy Framework, to ensure the protection and privacy of our customers' data.
BrainStorm's privacy stance emphasizes responsible and transparent handling of personal information. We process personal data to facilitate access to our services and collect it directly through various interactions, always with the user's knowledge. BrainStorm does not sell or share your data with any 3rd parties. We are committed to protecting user privacy in accordance with GDPR and CCPA and other US state laws.
For more information, please review our privacy policy here.
BrainStorm follows an internal incident management policy which establishes guidelines and standards for mitigating risks from security incidents, including security breaches and data compromises. It emphasizes the importance of planning for incidents before they occur and ensuring effective security for systems, networks, and applications. If an incident occurs, the BrainStorm security team will create a response plan and promptly notify the affected parties. Follow-up will include lessons learned and security hardening to prevent similar events in the future.
Yes, BrainStorm adheres to an SDLC that outlines guidelines and standards for the management and control of BrainStorm's information security acquisition, development, and maintenance. It mandates that information security requirements be analyzed at the earliest planning stages of any system or application to ensure they are an integral part of business requirements.
BrainStorm has implemented a structured vendor review process where vendors are vetted based on the services they provide to BrainStorm. Vendor Assessments are completed through reviewing vendor security policies and audit results to ensure vendor security measures are in line with BrainStorm standards.
The data BrainStorm processes is limited to what is necessary for the platform and does not include sensitive PII.
Yes, BrainStorm ensures that all customer data is encrypted both in transit and at rest. The encryption methods include 256-bit for symmetric encryption, 1024-bit for asymmetric encryption, TLS, and PGP.
Learn how BrainStorm’s powerful and flexible features help you reach more users, save time and money, and drive measurable impact at scale.
By submitting this form, you are agreeing to BrainStorm, Inc.’s privacy policy.
Copyright ©2024 BrainStorm, Inc All rights reserved