At BombBomb, we understand that trust is foundational to everything we do. That’s why protecting your data is one of our highest priorities. We are committed to upholding best practices in data security and privacy to ensure your information remains safe and secure.
Encryption
All customer data is encrypted both at rest and in transit:
-
At rest: We use AES-256 encryption for databases, file storage, and backups.
-
In transit: Data is secured using TLS 1.2 or higher to protect communication between systems.
This ensures your data is always protected, whether it's being stored or transferred.
Access Control
We enforce strict access policies across all systems:
-
Role-based access ensures that employees can only access the systems and data necessary for their job.
-
Multi-Factor Authentication (MFA) is required for all internal access.
-
Access permissions are reviewed regularly and adjusted based on role and need.
Our goal is to limit exposure and ensure only authorized personnel have access to sensitive information.
Infrastructure & Redundancy
To provide a reliable and resilient experience, we rely on top-tier cloud infrastructure providers. Our systems are designed with:
-
High availability
-
Automatic failover mechanisms
-
Redundant backups
These safeguards help us maintain maximum uptime and service continuity.
Compliance & Privacy
BombBomb’s data handling practices are aligned with leading industry standards and regulations, including:
-
SOC 2
-
General Data Protection Regulation (GDPR)
-
California Consumer Privacy Act (CCPA)
You can review our Privacy Policy for full details on how we collect, use, and protect personal information.
Monitoring & Incident Response
Our security team proactively monitors systems to detect and respond to threats:
-
Continuous monitoring for unauthorized or suspicious activity.
-
A formal incident response plan designed to quickly contain, investigate, and resolve any security event.
-
Transparent communication procedures in the event of a data-related issue.
Need More Info?
For organizations seeking more technical details, we’re happy to share our Information Security documentation under a mutual Non-Disclosure Agreement (NDA). Please reach out to our team to get started.