Skip to main content

Customer data security and support

The Kisi Support team is committed to providing the best support experience possible while maintaining strict data security standards. To ensure high quality service and minimize impact during the support experience, we may access your data as necessary to provide support as described in our Privacy Policy and Terms of Service.

Data access protocols

By submitting a support request, you consent to Kisi accessing your customer data to provide such support. We are transparent about:

  • What data we may need to access
  • Why access is necessary for support
  • How long we retain access logs
  • Who has permission to access customer data

Security measures

All of our Support staff are covered under comprehensive security protocols:

  • Non-disclosure agreements: All personnel sign binding NDAs
  • Background checks: Background verification for all data-access personnel
  • Trusted individuals: Only verified, trained individuals are permitted to access customer data
  • Access logging: Complete audit trails of all data access activities
  • Time-limited access: Support access only for the duration needed

Data protection commitment

We go to great lengths to protect the privacy of the data you've entrusted to us:

  • Secure channels: All support communications use encrypted channels
  • Data retention: Support-related data access is logged and retained per our data retention policies
  • Regular audits: Internal security audits of support processes and data handling
  • Minimal access principle: Only access data necessary for resolving your specific issue

Contact information

Support and security inquiries

Technical Support: Submit a support request

If you have questions or concerns about the handling of your data, please let us know through our support channels. The security and privacy of your data is our paramount concern.

Data protection rights

For information about your data protection rights and how to exercise them, see our Privacy Policy and Data Protection documentation.