Your data is secure, private, and protected — by design
Databox is built with enterprise-grade security, strict compliance
standards, and continuous monitoring to ensure your data is always safe.
Trusted by 20,000+ teams
More information
Learn more about our commitment to security, privacy and compliance.
SOC 2 Type II Compliance
We are currently in the process of obtaining SOC 2 certification. We are implementing and strengthening key security controls in alignment with SOC 2 requirements and working with an independent auditor. The formal audit and certification are planned in the near term, reflecting our commitment to security and trust.
Terms of Service
Our terms of service outline the rules and expectations that govern your use of Databox — clearly written and always up to date.
Privacy Policy
Our privacy policy explains what data Databox collects, how it's used, and how you can control, correct, or delete your information at any time.
Data Processing Agreement
Our Data Processing Agreement (DPA) outlines how Databox processes personal data on behalf of our customers in compliance with applicable data protection laws.
Frequently Asked Questions
What security certifications does Databox hold (e.g., SOC 2, ISO 27001)?
Databox is in the process of obtaining SOC 2 certification, validating the design of our security controls. We are currently undergoing an external audit to demonstrate the ongoing effectiveness of these controls over time.
While we are not currently ISO 27001 certified, we follow industry best practices and implement controls aligned with frameworks such as ISO 27001 and the NIST Cybersecurity Framework.
Does Databox perform penetration tests, and what is the frequency?
Yes, Databox conducts third-party penetration tests regularly to ensure the robustness of our security posture. We typically aim to perform these tests at least annually, and sometimes quarterly, especially when there are substantial changes to our infrastructure or emerging security concerns. Results and reports from these assessments are maintained for internal use only and are not shared externally.
Are vulnerability scans conducted both internally and externally?
Yes, we perform regular vulnerability checks, including penetration tests, both by our internal teams and external contractors. A regular security audit is part of our commitment to provide a secure and stable product to our users.
Where is customer data stored and processed?
All Databox products run on best-in-class servers in Amazon Web Services (AWS) data centers located in the United States of America (AWS East region). All AWS services are GDPR-compliant, and customer data is always protected and remains within these data centers.
Is Databox compliant with privacy regulations like GDPR?
Yes. Databox complies with GDPR and other applicable privacy regulations. We implement strong technical and organizational measures to protect personal data and ensure it is processed securely and transparently.
How is data secured in transit and at rest?
We adhere to the highest encryption standards:
- Data at rest is encrypted via AES-256 encryption.
- Data in transit is encrypted using SSL/TLS 256-bit encryption (TLS 1.2 or higher).
- Network security is multi-layered, utilizing Amazon’s Virtual Private Cloud (VPC), security groups, and system firewalls.
Is Multi-Factor Authentication (MFA) or Single Sign-On (SSO) supported/required?
For Databox Internal Use: Multi-factor authentication is required on all enterprise applications and production systems for Databox employees.
For Customers: Databox supports the SAML 2.0 Single Sign-On (SSO) login standard. MFA for customer accounts is optional but can be enforced by account admins on certain plans or by purchasing an add-on.
Who is the Data Protection Officer (DPO)?
Our Data Protection Officer (DPO) is Andrej Žitnik.
Who owns the data that is imported into Databox?
Customers retain complete ownership of their data, with Databox serving as a data processor under GDPR. We ensure that all data is managed in accordance with customer-defined permissions and privacy standards.
What is Databox's process for data deletion upon account termination?
Upon initiating the account deletion process, all related data is anonymized and securely deleted from our systems, including all backups, within a reasonable and specified timeframe as outlined in the Data Processing Agreement.
Does Databox provide official API documentation for developers?
You can find out more about our API functionality here: developers.databox.com.