Establishing trust through security

We are committed to providing secure environment for validating data submitted to our platform. As part of this commitment, we use a variety of industry-standard security technologies and procedures to protect your information from unauthorized access, use, or disclosure.

Our security program is responsible for the following areas:

  • Infrastructure and Network Security
  • Application Security
  • Privacy
  • Corporate Security
  • Data protection
  • Physical Security

Data center and network security

We have chosen a reliable partner for hosting of our servers at Hetzner Online, which is certified in accordance with DIN ISO/IEC 27001 standards.
The internationally recognized standard for information security certifies that Hetzner Online GmbH has established and implemented an appropriate Information Security Management System (ISMS). Hetzner Online utilizes the ISMS in its infrastructure and complete operations for the data center parks in both locations, Nuremberg and Falkenstein. FOX Certification, a third party certification authority, audited Hetzner Online's data center parks for the certification process.

This certification confirms that Hetzner Online will uphold strict information security standards. It states that we will keep your data under lock and key and that you will be guaranteed access to your IT systems. Most importantly, the certificate means that we are not satisfied with the status quo. Our ISMS requires us to continually reassess and improve our informations security methods, so that they always remain up-to-date.

For futhrer reference, you may review Hetzner's security certificate and security information at:

Data center and network security
Physical security Hetzner Online has three data center parks located in three different towns: Nuremberg and Falkenstein/Vogtland in Germany and Helsinki in Finland. A video-monitored, high-security perimeter surrounds the entire data center park. Entry is only possible via electronic access control terminals with a transponder key or admission card. All movements are recorded and documented. Ultra-modern surveillance cameras provide 24/7 monitoring of all access routes, entrances, security door interlocking systems and server rooms. Colocation rack clients have their own key and access code for the secure server rack. The administration interface Robot allows Colocation customers to set up their entry authorization in advance and allows them to make appointments for their first visit to the data center and/or for a service visit from an external company. A generated password enables on-site personnel to authenticate and issue a transponder key for the interlocking doors to the rack. The visit is logged, and the footage recorded is archived in the administration interface for monitoring purposes. The uninterrupted power supply (USV) is ensured with a 15-minute backup battery capacity and emergency dieselgenerated power. All UPS systems have redundant design. Direct free cooling allows for the environmentallyfriendly cooling of hardware. Climate control is effected via a raised floor system. A modern fire detection system is directly connected to the fire alarm center of the local fire department.
Network security Multiple redundant connections to the largest German internet exchange point, DE-CIX, ensure smooth data transfer. All existing upstreams and peerings are integrated in the backbone via state-of-the-art routers from Juniper Networks in order to boost the network’s capacity. In order to safeguard your web applications, websites, servers, and IT infrastructure from DDoS attacks, Hetzner Online utilizes its automatic DDoS protection system.
System security Security updates are continuously performed on managed servers. There is a central back-up server to save backed-up data. The RAID-1 hard disk system reduces the likelihood of data loss. Other optional features such as the Flexi-Pack provide the highest level of availability.
Encryption Encryption in Transit
Communications between you and servers are encrypted via industry best-practices HTTPS and Transport Layer Security (TLS) over public networks. By encrypting all data transmitted to our servers, we protect your data in transit.

Encryption at Rest
All customers of benefit from the protections of encryption at rest for offsite storage data and logs.
Data protection Personal information is saved and used exclusively for the preparation of invoices and for contact purposes. All employees are contractually obliged to comply with Paragraph 5 of the Federal Data Protection Act (BDSG). Information is solely relayed to for the preparation of invoices to concerned service partners (e.g. banks). Information is always forwarded according to the regulations of the Federal Data Protection Act (BDSG). The amount of transmitted information is kept to a minimum. If you have any questions on data protection, please contact

The Client may request documentation to verify the execution of the Technical and organizational measures taken by the Supplier in accordance with section 3 of this Agreement by completing the form at (Appendix 2 of the Agreement Pursuant to Art. 28 GDPR: Technical and Organizational Measures in Accordance with Art. 32 GDPR and Amendments)

Application security

Internal Audits
Our engineering team performs monthly internal vulnerability scans of our production environment. This is to ensure that all systems are not only patched against known vulnerabilities, but are following the industry best practices in security.

Web Application Firewall
Our servers are configured to monitor for malicious behavior and intrusion attempts and automatically block and notify us about such attempts.

Data Privacy
Access to account data by our employees is limited to a necessary set of users consistent with their assigned responsibilities. We believe in the concepts of ‘need to know’ and ‘least privileged’.
In addition to this, you are ultimately in control of what data is stored on our platform. We provide you the ability to disable data logging of the data sent to our service. This can be done from your Client Area -> Account -> Settings -> Security and Privacy section.

Product security features

Data Encryption
All data in transit is sent through https (TLS) encrypted connections. This ensures the confidentiality and integrity of the data sent between and the customer.

Data Removal
We provide a quick and easy way to request all data from our servers to be deleted for your account. By submitting a data deletion request, we will erase all information for your account from our servers such as ( account history, billing data, contact details, user identification and other.) This option is also used for one-off deletions of specific data.

API Security

* Our API uses HTTPS/TLS to protect all data transmitted between our clients and our platform.
* Each request to our API must be done with a valid API key identifying a valid and existing client.
* We have implemented IP access list which provides our clients with the option to restrict access to their API key to only certain IP addresses.

Sub-User Restrictions

Our clients can add sub-user accounts for their employees and colleagues to use the system. Those sub-users may not access sensitive information such as account history, privacy settings. This way the sub-user is only limited to using the service without having access to your account information.