How does Scrutinize use and protect my data?

Created by John Rea, Modified on Mon, 03 Apr 2023 at 12:48 PM by John Rea

Your data security is of the utmost importance to us. We appreciate the level of trust you place in us by using our service. That isn’t taken lightly by our team, and leaves no room for error. The following is an overview of the protocols and procedures we have in place to ensure your trust is well placed.


  • Data Encryption. Your data is encrypted in transit and at rest using industry best practices such as SHA-2 and AES-256 provided by Amazon Web Services.


  • Infrastructure. All data centers used to host your data are ISO 27001, SOC 1, SOC 2, PCI Level 1, FISMA Moderate, and Sarbanes-Oxley (SOX) certified compliant.


  • Privacy. Your data is only used to surface insights to you and enhance your experience. We will never sell your data to third-parties because it is not ours - it’s yours.


  • Suspicious Activity. If you ever notice anything strange about your account or believe your security has been compromised, do not hesitate to contact us immediately.


  • Least Privilege. Our internal security protocols are based on the principle of least privilege. No one at Scrutinize accesses any data that isn't required for their role.


  • Account Security. We use best in class access and identity management solutions to ensure your account is kept as secure as possible.

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select atleast one of the reasons

Feedback sent

We appreciate your effort and will try to fix the article