Trust and security

At Feedback Companion, the privacy and security of our clients' data are our highest priorities. Our system is designed to provide robust protection for all information, ensuring transparency and full control for our clients. Below, we outline the principles and measures we implement to safeguard your data.

Auditing and Monitoring
Enterprise clients can take advantage of advanced auditing and monitoring tools to test and configure their security settings. These tools allow for a detailed review of data access, providing transparency and control over who accessed information and when.

Commitment to Continuous Security
Security is not a one-time effort. We continuously monitor our environment to detect and mitigate potential vulnerabilities. Our systems are regularly updated to align with the latest security best practices and standards.


Certified EU Cloud Servers
We utilize only cloud providers that are certified to meet ISO 27001 and SOC 2 standards. These certifications reflect the highest levels of security, integrity, and availability in data center operations, ensuring our clients’ information is handled with the utmost care.
Enhanced Security for Enterprise Clients
For our Enterprise clients, we offer advanced security options, including:
Dedicated Tenants
IP Whitelisting
Bring Your Own Keys (BYOK)
field-level encryption
Role-Based Access Control (RBAC)
Anonymous Feedback Processing
By default, feedback is processed in a fully anonymous manner, removing any direct references to the identity of customers or users who provided the feedback. This ensures compliance with privacy regulations and minimizes exposure to personal data risks.
Private and Isolated Data
Feedback Companion ensures that all feedback and review data collected are strictly private and isolated within each client’s tenant. Each client operates in a fully segregated environment, there is no training or data-processing platform wide. This approach guarantees that the ownership and control of data remain exclusively with our clients.
Secure Communications
All communications between our systems and internal services are protected with TLS 1.2 or higher protocols.

This ensures that all transmitted data is encrypted and safeguarded from unauthorized access or interception.
Advanced Encryption
To ensure the protection of stored data, we implement encryption at rest.

This means that all information stored on our servers is encrypted to prevent unauthorized access, even in the unlikely event of a physical compromise of the storage infrastructure.