Data Privacy & Security

Trust Matters:
Pendo’s Commitment to You

At Pendo, performance, security and data privacy are first-order considerations, the north star for how we design our products and policies as an organization. We believe these principles need to be central to every decision we make, and everything we do as a company. That’s why we continue to make substantial investments in these areas to ensure that our solutions never negatively impact the integrity of your data, your users, or your application.

Meet Our DPO, Kate!

Kate Helin is Pendo’s data protection officer. A trained and licensed lawyer, Kate is responsible for defining and enforcing Pendo's privacy policies across the company. More about Kate here.

Certifications & Support

SOC 2

GDPR

Privacy Shield

Capabilities

Pendo has made extensive investments in data privacy and security, including:

Data Protection Officer

Data Protection Officer

Pendo has appointed a data privacy officer as the cross-functional company advocate for data privacy and security.

Privacy & Security Training

Privacy & Security Training

All Pendo employees are trained and certified on data privacy policies and best practices.

Vendor Audit & Approval Process

Vendor Audit & Approval Process

Pendo performs an extensive compliance review and approval process before licensing or using any third-party tools.

Data Encryption & Access Controls

Data Encryption & Access Controls

In transit and at rest, all customer data is encrypted using only industry-accepted tools, standards and best practices for data handling and security.

Role Based Permissions

Role Based Permissions

Pendo lets you set granular access controls to grant and restrict capabilities based on specific roles and authorities.

Audit Trails

Audit Trails

Pendo logs and stores every change, every action and every event, including the deletion of data, for easy auditing and root cause analysis.

Data Deletion Requests

Data Deletion Requests

Pendo supports data deletion requests for both the data we control and the data we process.

Data Segregation & PII

Data Segregation & PII

No customer data is ever commingled nor is customer-level information ever required to take advantage of the full feature set of Pendo products.

Resilience & Uptime

Resilience & Uptime

Pendo is designed for uninterrupted uptime and enterprise scale, processing millions of events per hour and billions per day, with no degradation of performance.

Looking Forward

Pendo continues to expand investment in areas of data privacy and compliance. In addition to the practices noted above, we have plans to pursue HIPAA and FedRAMP certifications in 2018.

Questions

For more information on security, privacy, and compliance please see our privacy policy, review the FAQs below, or contact us at [email protected] for specific data privacy-related questions.

You can also download our engineering guide for best practices on deploying, configuring, and managing Pendo for maximum performance and security.

Privacy Policy   Download Guide