Define our Information Technology Security and ensure they are kept current with relevant legislation and ensure they are available to relevant stakeholders.
View PolicyThis policy describes how this personal data must be collected, handled and stored to meet the data protection standards and to comply with the law.
View PolicyChanges are made to the information technology systems in a seven-step process to ensure quality, usability and security of newly released features.
View PolicyConsistently detect, respond, and report incidents. Restore information system functionality and business continuity as soon as possible.
View PolicyTake a look a our changelog. It highlights important changes we make to Ambassify and is the perfect way to keep up to date with the latest and greatest new features.
View our ChangelogDetails of our operational continuity performance is available from Ambassify's Status Page. Incidents resulting in outages are detailed via our status page.
Support Team: support@ambassify.com
View StatusOur Ambassify platform is auditted on a yearly basis for security vurnabilities by an external party. Read below what Preben from Sectricity had to say about the lastest security audit.
Sectricity has conducted a vulnerability assessment and has come to the conclusion that Ambassify has been built using secure design principals. The test conducted on May 2020 yielded no serious impactful threats.Download Audit Overview
If you have discovered or believe you have discovered potential security vulnerabilities in an Ambassify Service, we encourage you to disclose your discovery to us.
Security Team: security@ambassify.com
Report Vulnerability Download PGP KeyBy clicking "Allow All", you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts.
Read more about our Cookie Notice.