Privacy compliance and data processing addendum

We take our privacy obligations—and the protection of your information—seriously, and we comply with all applicable privacy laws and regulations.

You can learn more about Prodeology’s privacy practices in our Privacy Policy, and learn more about Prodeology’s commitment to compliance with the General Data Protection Regulation (“GDPR”).

At any time, you may export data from Prodeology to a CSV file by sending us an email to

Network and system security

When you visit the Prodeology website or use one of the Prodeology apps, the transmission of information between your device and our servers is protected using 256-bit TLS encryption. At rest, Prodeology encrypts data using AES-256.

Prodeology servers are located in the US and EU, in data centers that are SOC 1, SOC 2 and ISO 27001 certified. Prodeology’s data centers have round-the-clock security, automatic fire detection and suppression, fully redundant power systems, and strict controls for physical access.

We regularly install security updates and patches to keep servers up to date. Servers are segmented based on role and protected using restrictive firewalls.

Service reliability and durability

Prodeology utilizes an industry-leading Amazon Web Services (AWS) hosting infrastructure. Backups are geo-redundantly replicated across multiple availability zones for data durability. Prodeology maintains business continuity and disaster recovery plans. Components of the disaster recovery plan include multiple site operations playbooks, which are regularly reviewed and rehearsed. Prodeology implements extensive service monitoring, and our operations team is on call 24x7x365.

Product security

Within the Prodeology product, collaborator permissions can be managed at the workspace level or the account level. These permissions allow you to control who you share a workspace or base with and whether they can modify the workspaces or bases that you’ve shared with them. Prodeology also enables you to restrict access to a base or view share link with a password or with an email domain.

Organizational and information security

Prodeology vets employees and performs background checks in accordance with local laws. Employees complete annual security training, which covers topics such as data privacy, information security, and password security.

Employee workstations are configured with full-disk encryption, strong passwords, and automatic locking. Employees are prohibited from installing unauthorized software or using portable media.

Prodeology maintains separate production and testing environments.

Application security

As part of the software development process, code and configuration changes are thoroughly reviewed. Before being deployed, these changes are tested during the quality assurance process to help ensure a consistent experience across all devices, platforms, and browsers that are supported by Prodeology.

How to report an issue

If you believe you’ve discovered a security-related issue, please report the issue at