Your Security Matters

At Dots, we take pride in the trust our customers place in us to protect their data. We maintain this through strict access controls, regular security audits, and a strong culture of security awareness across our organization. This means all your data is always private, and is accessible only to you and the people you explicitly choose to share data with.

Learn More

Security-First Approach

Our ITAM software, built around our clients’ feedback, delivers the features and flexibility needed to excel in a dynamic work environment.

Data Encryption

Dots’ data transfers are secured with TLS encryption, customer data is protected using AES-256, and Personal Identifiable Information is encrypted at the code level.

Web Application Firewall

Dots use Web Application Firewall (WAF) to shield our application from external threats. Additionally, we support Google and Microsoft logins, along with other Single Sign-On (SSO) options.

User-Controlled

You have the freedom to delete your data at any time. All your data including your IT procurement and asset data is private by default and will not be shared with third parties without your explicit consent.

SOC2-label

We are SOC 2 Compliant

Service Organization Control 2 (SOC 2) is a highly regarded audit standard that focuses on evaluating the controls related to the security, availability, processing integrity, confidentiality, and privacy of service providers. Achieving SOC 2 certification demonstrates that our company has undergone a rigorous assessment of its internal controls and data protection measures by an independent auditor.

FAQs

Who has access to my data?

You retain ownership of all your data, including employees, locations, equipment, and assets. Non-administrative users do not have default access to this data. Access is granted solely with the consent of an administrator.

How can I delete my data?

You can request Dots to securely delete your data at any time. Our team aims to complete the process within 30 days, though it typically takes an average of 5 days.

Is Dots SOC 2 certified?

Dots is SOC 2 type 1 compliant. We are currently working on type 2 compliance.

How long is data stored?

We securely store and encrypt your data, ensuring it remains accessible to you. Logs are retained for up to three months or until you request their deletion or close your account. Once data is returned to Dots, our sub-processors do not retain any of it.

We delete your personal information when it is no longer needed or upon your request.

Is Dots GDPR compliant?

Dots is widely used by individuals and teams within major organizations that strictly comply with the General Data Protection Regulation (GDPR).

If you reside in the European Union (EU) or the European Economic Area (EEA), you have specific data protection rights under GDPR.

We provide tools that allow you to modify, rectify, erase, or restrict the use of your personal data. See the Dots Privacy Policy for details.

o request data removal from our systems, please email us at [email protected].

What else should I know about how Dots handles my data?

We do not rent or sell your personal data, including data received from third-party services such as Hibob, Jamf, or other partners, in personally identifiable form to anyone.

Who are your data sub-processors?

Our trusted sub-processors are carefully vetted to ensure the highest standards of security and privacy before being integrated into the Dots ecosystem.

Want to know more
about how we protect your data?

We adhere to the highest security standards and allow users to erase data effortlessly, whether for individual employees, IT equipment, or all user data. If you have any additional questions about data protection or security that are not covered here, please contact our data protection manager via email.

Contact Us

Connecting the Dots

Slack Us for Help