Trust & Security FAQ
Get answers to the top questions about how Split handles
data security, privacy, reliability, privacy, and compliance.
Split's security and technology compliance programs include safeguards that help protect your data as it moves through the Split service. Should you have any questions that are not below or in Split Security Program documentation and Compliance Program documentation please contact our support team at email@example.com or our security team at firstname.lastname@example.org.
Is your data encrypted?
Yes. Split leverages in-transit and at-rest encryption to help secure data sent between Split and our cloud infrastructure provider.
How are password stored?
Passwords are cryptographically hashed within Split.
Do you have a backup plan?
Yes. Split maintains a detailed business continuity and disaster recovery plan. We’ll be happy to share this plan upon request.
Can we see the testing reports?
Yes. Split is happy to share the reports prepared by third-party firms upon request.
Can you complete my security questionnaire?
Yes. We are committed to being open and transparent about our security practices. Our Security Program and Compliance Program documentation details the safeguards in place today. Further, our SOC 2 report is available upon request. Should the information displayed here not provide what you need, we are happy to review your questionnaire.
Does Split process Personal Data of its customers?
Where does Split send my data?
Today, Split stores data in its AWS data centers located in the US. Split may also allow employees and contractors located in the US, Europe, and South America access to certain data for product development, customer and technical support purposes.
Does Split have an Incident Response Plan?
Yes. Split maintains a detailed incident response plan. We’ll be happy to share this plan upon request.
Does Split have an uptime SLA?
Yes. Our Terms of Service outline Split’s uptime guarantee.
I found a vulnerability in Split’s product, how do I report it?
If you discovered a vulnerability in one of our products, we appreciate if you let us know so we can get it fixed as soon as possible. Please contact email@example.com or firstname.lastname@example.org and the vulnerability will be triaged appropriately.
Have additional questions?
Please don’t hesitate to reach out. We’re here to help answer any questions you may have.Contact Us