Security Policy

Our customers trust us with access to sensitive and valuable data to do our jobs. We take this responsibility very seriously. This document outlines our policies for being responsible stewards of this data.

Please send any question or comments to

Last update: October 10, 2017.

Our security philosophy

At MadKudu, we hold ourselves to a set of principles that guide every engineering and operational decision.

We treat your data like our data

We share our own internal business data with 3rd parties and expect them to adhere to a high level of security standards. We hold ourselves to this same level.

We follow industry best practices

The overwhelming majority of security issues can be avoided by following industry best practices: password policies, anti-virus software, encryption, access control. We adhere to them.

Policy reviews

We review and update this security policy every quarter to ensure we are current with best practices.

Our last review was in October 2017. The next one will be in December 2017.

Policy details

Access control

Data access is controlled on a need-to-know basis based on an employee's responsibilities. Two-factor authentication is used for all cloud services when available.


All data in transit is encrypted using TLS. All third-party credentials are encrypted at rest.

Data sharing

We don't share customer data with 3rd parties without a written agreement, with the exception of:

  • We store and process data on Amazon Web Services and IBM
  • Our app
  • We send email address and domain (separate from any other information) to Clearbit for data enrichment

Personally Identifiable Information (PII)

We only store the data we need and that is already available in other systems (analytics, CRM...).

We do not collect or store Social Security Numbers, Credit Card informations, user passwords...

Security training

We conduct security training for each new employee and repeat it annually.

Malware and anti-virus protection

We install malware and anti-virus protection software whenever prudent based on risk and best practices.

Access logging

We log accesses to all hosts and databases and retain access logs for a minimum of one year.

Incident management procedure

We will notify customers about any confirmed security or privacy breach as soon as possible. We provide assessment and mitigation reports within:

  • 24 hours for a critical events.
  • 2 business days for non-critical events.