security.circleback.ai Open in urlscan Pro
2a09:8280:1:667:634a:5608:6788:3e70  Public Scan

URL: https://security.circleback.ai/
Submission: On November 01 via automatic, source certstream-suspicious — Scanned from DE

Form analysis 1 forms found in the DOM

<form action="" novalidate="" role="search" class="sc-183eb46a-1 jZQMOW"><input aria-autocomplete="both" aria-labelledby="sp-search-autocomplete-label" autocomplete="off" autocorrect="off" autocapitalize="none" enterkeyhint="search"
    spellcheck="false" placeholder="Find Item..." maxlength="512" role="searchbox" theme="[object Object]" type="search" id="sp-search-autocomplete-input"
    class="sc-183eb46a-2 iSANyo sp-SearchBox shadow-sm sp-SearchBox shadow-sm hide-clear form-control" value=""><button type="submit" class="sc-183eb46a-3 jvyHOG mx-1"><svg aria-hidden="true" focusable="false" data-prefix="fas"
      data-icon="magnifying-glass" class="svg-inline--fa fa-magnifying-glass " role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512">
      <path fill="currentColor"
        d="M416 208c0 45.9-14.9 88.3-40 122.7L502.6 457.4c12.5 12.5 12.5 32.8 0 45.3s-32.8 12.5-45.3 0L330.7 376c-34.4 25.2-76.8 40-122.7 40C93.1 416 0 322.9 0 208S93.1 0 208 0S416 93.1 416 208zM208 352a144 144 0 1 0 0-288 144 144 0 1 0 0 288z">
      </path>
    </svg></button></form>

Text Content

SECURITY PORTAL

Subscribe
Get access to this Security Portal
 * Review sensitive security details
 * Unlock documents
 * Submit security questionnaires
 * Ask for more information

Request access
Had access before? Reclaim access

OVERVIEW

Welcome to Circleback's Security Portal. Our commitment to data privacy and
security is embedded in every part of our business. Use this Security Portal to
learn about our security posture and request access to our security
documentation.

If you have any questions, email support@circleback.ai.

COMPLIANCE


GDPR

SOC 2
Get access to this Security Portal
 * Review sensitive security details
 * Unlock documents
 * Submit security questionnaires
 * Ask for more information

Request access
Had access before? Reclaim access
RISK PROFILE

Data Access LevelRestricted
Impact LevelSubstantial
Recovery Time ObjectiveImmediate
See more
PRODUCT SECURITY

Audit Logging
Data Security
Integrations
See more
REPORTS

We may provide security-related reports upon request.

SELF-ASSESSMENTS

We are working on our security compliance. We can provide completed
questionnaires upon request.

DATA SECURITY

Access Monitoring
Backups Enabled
Data Erasure
See more
APP SECURITY

Code Analysis
Software Development Lifecycle
LEGAL

Subprocessors
Privacy Policy
Terms of Service
DATA PRIVACY

Data Breach Notifications
Data Into System
Data Out of System
ACCESS CONTROL

Data Access
Logging
Password Security
INFRASTRUCTURE

Azure
Google Cloud Platform
ENDPOINT SECURITY

We follow industry best practices for endpoint security. We are happy to provide
more details about our endpoint security practices upon request.

NETWORK SECURITY

We protect our corporate network against external & internal threats.

CORPORATE SECURITY

We implement internal measures and practices to maintain a high standard of
security.

POLICIES

We are currently working with experts to put together our company policies.
Please contact us for more details.

SECURITY GRADES

We are constantly monitoring the security of our website. We will post our
grades from public security rating agencies when they become available.

If you need help using this Trust Center, please contact our Cybersecurity Risk
team.

Contact Support
Powered by