Infrastructure
Hootsuite utilizes both cloud and physical servers in our infrastructure. Our cloud is provisioned by a well-known top tier provider. Our physical servers are located in Tier-4 datacenters with full power, cooling, and network redundancy.
Security
We value your data, and we work hard to protect it. We store it on multiple hosts in multiple locations and back it up regularly, as often as four times per day per datastore. Data stored on our physical servers is protected by biometric locks, multiple layers of access security, and 24x7 interior and exterior surveillance.
Host Security
Only our Engineering team has access to our production environment. SSH keys or Kerberos tokens are required for console access to servers in all of our environments. We have automated processes in place that monitor each host for unauthorized login attempts, and offending IP addresses are automatically blacklisted and alerted.
Data Rights
Hootsuite Media Inc. uses third party vendors and hosting partners to provide the necessary hardware, software, networking, storage, and related technology required to run Hootsuite. Although Hootsuite Media Inc. owns the code, databases, and all rights to the Hootsuite application, you retain all rights to your data.
Data Protection
In 2016 the European Commission approved and adopted a new framework for European data protection law called the General Data Protection Regulation (GDPR). The GDPR requirements will become effective on May 25, 2018 and will affect all companies who process personal data of individuals in the EU.
More information on the General Data Protection Regulation (GDPR).
How to Contact Hootsuite about Security Questions
Twitter: @Hootsuite_Help
Web: http://hootsuite.com/help
How to Report a Security Incident
To report an incident of suspected abuse, misuse, or a security issue you have discovered please see our Security Response page. For incidents that affect a single account, please contact Hootsuite Help.
Thank You
We respect the effort and skill that goes into finding and disclosing security flaws. We are grateful for the generosity and support of the following individuals and organizations:
- Abdelali Khalfi
- Kaushik Roy
- Chirag Solanki
- Zee Shan
- Muhammad Talha Khan
- Simone Memoli
- Issam Rabhi
- Prem Kumar
- Ketan Sirigiri
- Nakul Mohan
- Anurag Giri
- Kimli Welsh
- Mohamed Abdelbaset Elnoby
- Abdul Haq Khokhar
- Abdul Rehman
- Mert Tasci
- Kamil Sevi
- Mohammed Fayez Albanna
- Conal Mittal
- Lisha Batta
- Tanniru Ankamma Raju
- Simon Song
- Russel Laurio
- Ala Arfaoui
- SaifAllah benMassaoud
- Ahmed Y. Elmogy
- Ketan Patil
- Pratik Panchal
- Abdel Hafid Ait Chikh
- Suraj Mulik
- Ahmed Adel Abdelfattah
- Muhammed Gamal Fahmy
- Shawar Khan
- Balvinder Singh
- Jigar Thakkar (Akhani)
- Nithish M. Varghese
- Rafael Pablos
- Abbassi Ahmed Jalal
- Sarwar Jahan M
- Guilherme Scombatti
- Andy Leung
- Ma La
- Hussain Adnan
- Yaroslav Olejnik
- Girish
- Ahmed Adel Abdelfattah
- Dominic Li
- Ahsan Tahir
- Mansoor Gilal
- AbedAlqader Swedan
- Nikhil Mittal
- Koen Rouwhorst
- Yasin Soliman
- Wai Yan Aung
- Ajay Kulal
- Ali Hassan Ghori
- Ahsan Khan
- Abiral Shrestha
- Guifre Ruiz
- Eric
- Jose Carlos Exposito Bueno
- Sreedeep.Ck Alavil
- Mrityunjoy Emu
- Amal Jacob
- Pal Patel
- Daniel Diez
- Muzamil Shah
- Akaash .M Sharma