Security

DATA SECURITY FOR FEELINGSTREAM

Get full visibility with the needed security

The security of our customers’ data and our services is our priority. Our focus is always on information security, and it is an essential part of our product development. 

There are numerous aspects to security in our line of work. As a result, we understand that you may have many questions in this regard; thus, let us provide a brief summary of how we secure, protect, and anonymise data.

Feelingstream is ISO27001 certified
SECURELY UNLOCK THE VALUE OF YOUR CUSTOMER CONVERSATIONS

Using knowledge from customer conversations can make an immense impact on companies striving towards achieving their business goals, whether they are related to quality, sales, or efficiency. At the same time, many companies have not explored this area due to security concerns. 

We are dedicated to protecting our customers’ data and place a strong emphasis on maintaining the highest levels of data security. Our team is committed to ensuring that all data is processed securely and protected from potential risks. We ensure that our customers’ data is kept confidential, and that all data processing complies with applicable rules and industry standards.

Feelingstream is ISO27001 certified
YOUR ISO CERTIFIED PARTNER

To achieve the highest information security management requirements

The ISO/IEC 27001 certificate is a valuable asset for any business since it confirms the company’s dedication to ensuring a secure environment for its data. As data and information security grow more crucial for businesses, the certificate ensures that the company meets the highest standards for information security management. By owning the ISO/IEC 27001 certificate, a company can show its customers, partners, and other stakeholders that it is dedicated to protecting its information and data, which builds trust and credibility.

We are pleased to announce that we have obtained ISO/IEC 27001 certification.

The scope of the certification is ISMS (Information security management system) covering development, deployment, support, and maintenance of conversation analytics platform and customer service. This achievement demonstrates our dedication to ensuring strong data security practices. This was no easy task; it required a rigorous process that went beyond a simple request for accreditation. Nonetheless, our unwavering commitment to data security drove us to achieve this milestone. 

  • Highest standards
  • Trustworthy
  • Dedicated to data security

OUR SECURITY ASPECTS

ON-PREMISE AND CLOUD-BASED SETUP

We provide both on-premise and cloud-based solutions. The customer makes the decision based on their needs. On-premise configurations are deployed locally in the customer’s internal data centres and do not require an internet/external connection. Cloud-based setups have verified security levels with providers such as Microsoft Azure, AWS, or Google Compute Cloud. 

The customer can audit and verify the deployment. This setup provides scalable resources with verified security levels. 

DATA ANONYMISATION

We put the utmost emphasis on data security because the interactions we use to collect data from contain a variety of personally identifiable information (PII). We can anonymise discussions from various channels and data from all sources. We can remove numbers, email addresses, links and names, custom words from conversations both in audio and text. This protects the confidentiality of data as necessary. To make the speaker unrecognisable, we change the tonality of their voice in audio format.

GRANULAR USER ACCESS

We have implemented a granular user-groups-based access policy in our conversation analytics tool. Different groups are granted access to conversations based on their needs; for example, access can be restricted to specific channels, event types, teams, time, or to only show anonymised data. Our customers can customise user group and single-user access rights to meet their specific requirements. Additionally, customer opt-out from analysis is taken into consideration for content access.

ACTIVITY LOG

All activities in our tool are logged. This covers any activities performed by any user. We can recreate the user journey if necessary and see what the user has looked at and done in the system. All these measures help us to ensure that our tool is safe, secure and that our users have the best experience possible.

BACKGROUND CHECKS

Background checks on employees are an important step in ensuring data and information security. We check a person’s background before hiring them in order to confirm their identity and qualifications.  
Before beginning a project, we can meet with a customer’s request for a thorough background check on our employees that includes looking into their criminal records.

DATA RETENTION

We retain data for analysis according to the period specified by the customer. This applies to both anonymised and non-anonymised data, as well as audio and text. As we progress through the timeline specified by the customer, we delete data that falls outside the retention period. Once deleted, this data is not restorable. 

TRANSMISSION AND TECHNICAL SETUP

To protect data during transmission, all data transmissions are encrypted using industry-standard.   

To securely import and export data, the platform provides out-of-the-box integrations for REST API.

TECHNICAL SECURITY LAYERS

We have implemented technical security layers to protect our mission-critical systems from external attackers. Access is restricted based on user roles and user rights determine which services and networks they can access.

MULTI-FACTOR AUTHENTICATION

Login to the platform and learning environment using multi-factor authentication. An additional layer of security to secure the safety of our customers’ accounts.

BEYOND WORDS IN DATA SECURITY

Do you have questions about GDPR or data security?