Skip to content
  • There are no suggestions because the search field is empty.

Security & Data Privacy

How Pyramyd Protects Your Data

Overview:
Your trust is vital. This article explains how Pyramyd ensures your data is secure and your privacy is protected. We cover everything from encryption and access controls to our compliance with global privacy regulations. (Note: All data used for scoring is anonymized and aggregated, and features like in‑app collaboration with audit trails are on our roadmap.)

Data Encryption & Secure Hosting

  • In Transit: All data transmitted between your device and our servers is protected with state‑of‑the‑art TLS encryption (TLS 1.2 or above).

  • At Rest: Data stored on our servers is encrypted with AES‑256 encryption, the same robust standard used by banks and other high‑security organizations.

  • Secure Cloud Infrastructure: Our hosting partners (AWS, Google Cloud, or Microsoft Azure) meet stringent security standards and certifications (SOC 2, ISO 27001, etc.).

In Transit: All data transmitted between your device and our servers is protected with state‑of‑the‑art TLS encryption (TLS 1.2 or above).

At Rest: Data stored on our servers is encrypted with AES‑256 encryption, the same robust standard used by banks and other high‑security organizations.

Secure Cloud Infrastructure: Our hosting partners (AWS, Google Cloud, or Microsoft Azure) meet stringent security standards and certifications (SOC 2, ISO 27001, etc.).

Access Controls and Authentication

  • User Authentication: Your account is safeguarded by a secure password (stored in a hashed form).

  • Two‑Factor Authentication (2FA): You can enable 2FA in your account settings for an added layer of security.

  • Single Sign-On (SSO): Enterprise customers can use SSO via providers like Okta or Azure AD for streamlined and secure access.

  • Role‑Based Access: Within your workspace, only invited team members with the appropriate roles can access data.

User Authentication: Your account is safeguarded by a secure password (stored in a hashed form).

Two‑Factor Authentication (2FA): You can enable 2FA in your account settings for an added layer of security.

Single Sign-On (SSO): Enterprise customers can use SSO via providers like Okta or Azure AD for streamlined and secure access.

Role‑Based Access: Within your workspace, only invited team members with the appropriate roles can access data.

Data Privacy and Compliance

  • GDPR & CCPA: Pyramyd complies with GDPR and CCPA, giving you the right to access, modify, or delete your personal data.

  • Data Anonymization: All data used for vendor scoring and competitive intelligence is aggregated and anonymized. We ensure no personally identifiable information (PII) is shared with third parties.

  • Data Export and Deletion: You can export your data (e.g., project details, reports) and request account deletion at any time.

  • Confidentiality: For vendors and buyers alike, any sensitive information remains confidential. Our non‑circumvention clause ensures that vendors cannot use your shared requirements to contact you directly.

GDPR & CCPA: Pyramyd complies with GDPR and CCPA, giving you the right to access, modify, or delete your personal data.

Data Anonymization: All data used for vendor scoring and competitive intelligence is aggregated and anonymized. We ensure no personally identifiable information (PII) is shared with third parties.

Data Export and Deletion: You can export your data (e.g., project details, reports) and request account deletion at any time.

Confidentiality: For vendors and buyers alike, any sensitive information remains confidential. Our non‑circumvention clause ensures that vendors cannot use your shared requirements to contact you directly.

Ongoing Security Measures

  • Regular Audits: We perform regular security audits and vulnerability scans to identify and fix any issues.

  • Incident Response: In the unlikely event of a security incident, we have an incident response plan to minimize impact and notify affected users promptly.

  • Roadmap Enhancements: Future updates will include in‑app collaboration audit trails, so every change is logged for transparency.

Regular Audits: We perform regular security audits and vulnerability scans to identify and fix any issues.

Incident Response: In the unlikely event of a security incident, we have an incident response plan to minimize impact and notify affected users promptly.

Roadmap Enhancements: Future updates will include in‑app collaboration audit trails, so every change is logged for transparency.

Conclusion:
Pyramyd is committed to safeguarding your data with top‑notch security practices and robust privacy policies. By using industry‑leading encryption, strict access controls, and compliance with major privacy regulations, we ensure that your sensitive information remains secure. If you have any questions about our security measures, please contact our support tea