Everything in place and
protected. Like home.

In order to protect the personal data you handle on behalf of your customers, with our relocation platform you know exactly what data is processed, who has access to it, and where it is located. You also know what security and compliance measures are in place.


Your trust in the security of our systems, application and your data is of utmost concern to us. We dedicate significant time and resources to building the right technology solutions and safeguarding against known security vulnerabilities of cloud-based software.

Systems security.

This covers the physical and environmental security of servers and data centers, as well as technical security of the network, resources and systems. We work with trusted service partners to provide enterprise-level security to host and maintain our servers, data storage and related technology services.

Our partners' hosting environment and data centers include the following accreditations:

  • ISO 27001
  • SOC 1 & SOC 2 / SSAE 16
  • PCI Level 1
  • FISMA Moderate
  • Sarbanes-Oxley (SOX)
Application security.

Securing the application layer is a serious commitment and can be achieved, among others, through:

  • Careful selection of technology frameworks
  • Rigorous software development lifecycle
  • Health monitoring and tracking tools
  • Security mindset to architecture design
  • Conducting regular vulnerability assessments
Data security.

In addition to utilizing a secure hosting environment, the data itself should be protected through encryption. Personal data processed and stored on our platform is encrypted with TLS/SSL protocols when in transit and block-level storage encryption when at rest.


We have always held strong believes that personal data should be kept private and used only for the specific purposes for which it was collected. That has been part of our software development philosophy from the beginning. As such, we happily embraced the ‘Privacy by Design' principles advocated by the GDPR.

Your data privacy compliance.

While we adhere to various international data privacy regulations, with the GDPR having emerged as the global standard, we have adopted the same global approach on our platform. You will benefit from several tools and features available on the platform to help you towards your own GDPR compliance.

Some examples:

  • Built-in data classification model
  • Your own data retention policy mechanism
  • Tools for data access and rectification
  • User authentication & permission controls
  • Plain language privacy statement
  • Security audit logs
ISO 27001.

Beyond ensuring that our core hosting partners are ISO 27001 certified, we have adopted many ISO 27001 principles as part of our own software development lifecycle and day-to-day operations.

In addition to our security and compliance measures mentioned above, these include the following policies and practices:

  • Information Security Policy
  • Incident Response Plan
  • Data Retention Policy
  • Staff Code of Conduct
  • Staff security training
  • Business continuity planning
Banner logo

Have any questions?We'll answer them for you.

Book an appointment with us, and we'll explain in detail how we take care of personal data and security.

Contact us