Attention Insight is an attention analytics platform that is used by hundreds of companies, agencies, and solopreneurs to optimize designs, boost conversion rates, and validate early-stage concepts. We are an EU company and follow the best standards to ensure Security, Data, and Customers protection. We take our customers and their users’ data very seriously. Attention Insight takes full responsibility for all data that are processed through the platform and our plugins. Our data is fully encrypted, managed, and stored by SOC-compliant vendor Google Cloud.
All data handled and processed through the Attention Insight platform is fully secured against unauthorized access. Only authorized limited Attention Insight personnel are allowed to access such data and are required to authenticate themselves whenever such data is accessed. We have also taken robust measures to prevent unauthorized access, theft, and manipulation of data. Access reviews are done upon onboarding and offboarding as well as routinely once every quarter.
We use encryption standards AES-256 for data at rest. We use TLS 1.3 for data in transit (Qualys SSL Labs gives us A+ rating)
All our authentication keys are securely hashed, and we employ GCP tools for the management of production secrets.
All customer-uploaded files are encrypted in storage and have no direct public access. Access to each file is through fine-grained authentication.
Account Access is controlled, and SSO integration for enterprise customers can be set up. Transparent and fine-grained control over user access. Multi-Factor Authentication (MFA) can be provided for an additional layer of security. User management can be done by the customer super users on the platform. Any user can be added or removed from the platform.
Customers can set up how long any uploaded data is stored in the platform and then automatically removed.
We use CloudFlare to manage our external networks and mitigate any network attacks. We have implemented Identity Aware Proxies for our internal services access with whitelisted IP control.
We regularly update our application and third-party library to ensure the latest security bug fixes.
We perform periodical automatic vulnerability scanning of our application.
Attention Insight platform does not require any installation on Customer-side websites, servers or infrastructure. We do not collect any data on behalf of customers. All data (images/video) is uploaded directly to the platform or via API by the Customer.
All credit card payments made to Attention Insight go through Stripe. Details about their security setup and PCI compliance can be found on Stripe’s security page.
The development and testing environments are fully separated and isolated from the production environment.
Automatic testing is implemented on all application levels: frontend, backend, and internal services in CI / CD process.
At Attention Insight, we take any potential security incident very seriously. We have established a comprehensive Incident Response protocol designed to rapidly detect, contain, and resolve any security events, ensuring that any impact on our customers is minimized.
Our Incident Response Process Includes:
Always Here to Help:
Our Incident Response team is available 24/7. If you suspect any security issues or observe unusual activity, please contact us immediately. You can reach us through Intercom or by emailing [email protected]. We are committed to transparent and timely communication throughout the incident management process.
At Attention Insight, we believe that robust security begins with a strong foundation in employee and operational practices. Our comprehensive approach ensures that every team member is equipped and empowered to safeguard our systems and your data.
Employee Security
2FA is mandatory on all internal/external services for all employees.
Operational Security
Third-Party Vendor Oversight:
All third-party vendors and service providers are rigorously evaluated for compliance with our security standards. We require vendors to adhere to similar stringent security practices, ensuring end-to-end protection throughout our supply chain.
The Attention Insight platform architecture was built to ensure maximum accessibility and uptime. Our Website, Platform and API are separated in our production server, and redundant failover servers are set in place. Auto-scale is turned on in case of increased load, or resource demand. All of our data is synced in real-time with multiple backups on a daily basis.
Availability can be checked at https://status.attentioninsight.com/
With Enterprise customers and API users, we can sign Service Level Agreements (SLAs) if needed.
We perform daily backups of all application data and configuration in multiple locations. We ensure every instance is fully encrypted and secured and older backups are automatically removed.
Failover and Disaster Recovery
As the GDPR provides the golden standard when it comes to Data Protection, Customers and Prospects can request our DPA which covers the mechanisms and measures implemented by Attention Insight to reflect the Eight User Rights reflected within the EU’s GDPR framework. Please find below the flow regarding Data Deletion if you’d like to manually do it, feel free to reach out to the Attention Insight team if you’d like this to be done via the team.
Subscription cancelation steps:
Account deletion steps:
The account is marked for deletion and is scheduled for the deletion process on the same day. Deletion removes related data deletion from databases and uploaded files from storage. A deleted account cannot be recovered.
Additionally any user can set up an interval for how long to keep uploaded data (design images, video). Can choose from 1 day, 1 week, 1 month, 3 months, 6 months, 1 year, or do not delete. Delete is done automatically.
SOC 2 standard is based on five “trust service principles”: security, availability, processing integrity, confidentiality, and privacy. In Attention Insight we are doing our best to follow and implement these principles:
Current and potential customers of Attention Insight can now be sure about its data protection mechanisms quality and in case they have any questions, can contact us at [email protected].
Attention Insight ensures HIPAA compliance to demonstrate its commitment to providing the highest security standards for customers and potential prospects in the health industry. When clients opt to utilize the Attention Insight tool for attention analytics with Protected Health Information (PHI), they can trust in our adherence to the Health Insurance Portability and Accountability Act (HIPAA). This legislation establishes the benchmark for safeguarding sensitive patient data. Companies handling PHI are mandated to implement and adhere to robust physical, network, and procedural security measures. Covered entities, encompassing those involved in healthcare treatment, payment, and operations, as well as business associates with access to patient information and support roles, must meet HIPAA compliance requirements.
It is important to note that Attention Insight does not inherently work with PHI. However, for our customers who store and process PHI, we want to reassure them that our application strictly adheres to the HIPAA framework, providing a secure environment for handling sensitive health information.
To report any issues or request more information, please drop us an email at [email protected]
We’re nearly done crafting our new Figma plugin.