Security at Qualtir

Qualtir is built on industry-leading standards to ensure your data remains private, protected, and compliant.

Last updated: January 2025

At Qualtir, security is not an afterthought — it is built into every layer of our products and infrastructure. We implement industry-leading measures to protect your data and ensure our services remain reliable, private, and compliant with international standards.

1. Data Encryption

All data transmitted between your browser and our servers is encrypted using TLS 1.2 or higher. Data at rest is encrypted using AES-256, ensuring that your information is protected whether it is in transit or stored on our infrastructure.

  • In transit: TLS 1.2+ encryption for all data moving between clients and servers
  • At rest: AES-256 encryption for all stored data
  • Key management: Encryption keys are managed through Google Cloud Key Management Service
  • Database encryption: All databases are encrypted at the storage level

2. Access Controls

We follow the principle of least privilege. Access to customer data is strictly controlled and limited to employees who require it to perform their job functions.

  • Role-based access control (RBAC) across all internal systems
  • Multi-factor authentication (MFA) required for all employee accounts
  • Access logs are maintained and reviewed regularly
  • Privileged access is time-limited and subject to additional approval
  • Employee access is revoked immediately upon departure

3. Infrastructure & Hosting

Our entire infrastructure is hosted on Google Cloud Platform (GCP), one of the most secure and reliable cloud environments available. GCP data centres are physically secured, with multiple layers of protection including biometric access, 24/7 surveillance, and redundant power systems.

  • Data hosted in GCP data centres in the EU and US regions
  • Network-level firewalls and DDoS protection
  • Automated vulnerability scanning of infrastructure
  • Private VPC networks isolating production environments
  • Regular penetration testing by third-party security firms

4. Monitoring & Audits

We continuously monitor our systems for unusual activity, security threats, and performance anomalies. All significant actions within our platform are logged and retained for audit purposes.

  • 24/7 automated monitoring with real-time alerting
  • Security Information and Event Management (SIEM) integration
  • Annual third-party security audits and penetration tests
  • Regular internal audits against ISO 27001 controls
  • Comprehensive audit logs retained for a minimum of 12 months

5. Incident Response

We have a documented incident response plan that is regularly tested and updated. In the event of a security incident, we are committed to acting swiftly to contain the issue, assess the impact, and notify affected customers in accordance with our obligations under GDPR and other applicable regulations.

  • Defined escalation paths and on-call security response team
  • Target containment within 1 hour of confirmed incident
  • Customer notification within 72 hours of a confirmed breach (as required by GDPR)
  • Post-incident review and remediation to prevent recurrence

6. Data Retention & Deletion

We retain your data only for as long as necessary to provide our services and meet our legal obligations. When data is no longer needed, it is securely deleted using industry-standard methods.

  • Account data is deleted within 90 days of account closure
  • Backups are retained for 30 days and then permanently destroyed
  • Secure deletion procedures applied to all storage media
  • Data deletion requests are processed within 30 days

7. Google Workspace Extensions

Our Google Workspace extensions are designed with a minimal-permission approach. We request only the permissions that are strictly necessary to provide the functionality of each extension, and we do not store or process your Google documents beyond what is required.

  • Compliance with the Google API Services User Data Policy and Limited Use requirements
  • No persistent storage of Google Doc, Sheet, or Drive content on our servers
  • OAuth 2.0 used for all Google account authorisation
  • Users can revoke access at any time through Google Account settings
  • Extensions undergo Google's security review process before publication

8. Responsible Disclosure

We welcome responsible disclosure of security vulnerabilities from the security community. If you discover a potential security issue, please contact us at contact@qualtir.com. We commit to acknowledging your report within 48 hours and working with you to understand and address the issue as quickly as possible.

Questions About Security

If you have any questions or concerns about how we protect your data, we are happy to help.

Qualtir Security Team

Security inquiries: contact@qualtir.com

General inquiries: contact@qualtir.com