Many of our customers seek clarity on how their data is handled within our services. This article aims to instill confidence by furnishing you with the essential information needed for understanding this process.
We tailor our approach to data handling based on the specific service you're utilizing from Weavo.
Liquid Loom Generator and Connector
For our Liquid Loom generator and connector, rest assured that we don't retain any of your data beyond processing. The Liquid Loom operates in a stateless manner, meaning that once your input data is processed and a response is delivered, it's promptly and permanently removed from our systems.
Integrations delivered as a service
In the case of customers subscribed to our "integration as a service" offering, where we facilitate integrations between applications, we temporarily store all data passing through the integration for 90 days. This allows us to promptly address any potential issues that may arise. Following this period, all data is securely and permanently deleted from our systems.
You can learn more in the Data Processing Agreement (DPA)
We cannot access any data which is sent to our services, Liquid Loom Generator or Connector.
Should you require assistance from our support team to troubleshoot issues related to the Liquid Loom Generator or Connector, you may be requested to provide sample data to help us replicate the problem on our end. We kindly advise excluding any sensitive data from these samples.
Regarding our Integration as a Service, we may access data for up to 90 days after it entered our systems, but rest assured that this will only occur if requested by you. Access to this data is strictly limited to authorized personnel on our team. Additionally, we implement thorough logging of all data usage and enforce 2-factor authentication for all staff members to ensure the highest level of security and accountability.
Rest assured, your data is safeguarded both during transit and while at rest. At Weavo, we employ robust encryption measures to ensure the security of your information. Our services utilize 256-bit AES encryption for transient data storage and employ SHA-256 with RSA Encryption SSL certificates across all API services. Additionally, all our API services adhere to TLS1.2 as the minimum standard and strictly enforce the HTTPS protocol.
Your data will be processed in the nearest Azure data center where Weavo maintains a presence by default. Currently, our services are operational in Azure data centers located in:
We utilize Azure Front Door for request management and distribution.
Weavo relies exclusively on Microsoft Azure 'PaaS' so your data will never leave a Microsoft data center. By leveraging Microsoft Azure 'PaaS' services, Weavo maximizes the utilization of all native Microsoft Azure security features.
Many of our customers seek clarity on how their data is handled within our services. This article aims to instill confidence by furnishing you with the essential information needed for understanding this process.
We tailor our approach to data handling based on the specific service you're utilizing from Weavo.
Liquid Loom Generator and Connector
For our Liquid Loom generator and connector, rest assured that we don't retain any of your data beyond processing. The Liquid Loom operates in a stateless manner, meaning that once your input data is processed and a response is delivered, it's promptly and permanently removed from our systems.
Integrations delivered as a service
In the case of customers subscribed to our "integration as a service" offering, where we facilitate integrations between applications, we temporarily store all data passing through the integration for 90 days. This allows us to promptly address any potential issues that may arise. Following this period, all data is securely and permanently deleted from our systems.
You can learn more in the Data Processing Agreement (DPA)
We cannot access any data which is sent to our services, Liquid Loom Generator or Connector.
Should you require assistance from our support team to troubleshoot issues related to the Liquid Loom Generator or Connector, you may be requested to provide sample data to help us replicate the problem on our end. We kindly advise excluding any sensitive data from these samples.
Regarding our Integration as a Service, we may access data for up to 90 days after it entered our systems, but rest assured that this will only occur if requested by you. Access to this data is strictly limited to authorized personnel on our team. Additionally, we implement thorough logging of all data usage and enforce 2-factor authentication for all staff members to ensure the highest level of security and accountability.
Rest assured, your data is safeguarded both during transit and while at rest. At Weavo, we employ robust encryption measures to ensure the security of your information. Our services utilize 256-bit AES encryption for transient data storage and employ SHA-256 with RSA Encryption SSL certificates across all API services. Additionally, all our API services adhere to TLS1.2 as the minimum standard and strictly enforce the HTTPS protocol.
Your data will be processed in the nearest Azure data center where Weavo maintains a presence by default. Currently, our services are operational in Azure data centers located in:
We utilize Azure Front Door for request management and distribution.
Weavo relies exclusively on Microsoft Azure 'PaaS' so your data will never leave a Microsoft data center. By leveraging Microsoft Azure 'PaaS' services, Weavo maximizes the utilization of all native Microsoft Azure security features.
Many of our customers seek clarity on how their data is handled within our services. This article aims to instill confidence by furnishing you with the essential information needed for understanding this process.
We tailor our approach to data handling based on the specific service you're utilizing from Weavo.
Liquid Loom Generator and Connector
For our Liquid Loom generator and connector, rest assured that we don't retain any of your data beyond processing. The Liquid Loom operates in a stateless manner, meaning that once your input data is processed and a response is delivered, it's promptly and permanently removed from our systems.
Integrations delivered as a service
In the case of customers subscribed to our "integration as a service" offering, where we facilitate integrations between applications, we temporarily store all data passing through the integration for 90 days. This allows us to promptly address any potential issues that may arise. Following this period, all data is securely and permanently deleted from our systems.
You can learn more in the Data Processing Agreement (DPA)
We cannot access any data which is sent to our services, Liquid Loom Generator or Connector.
Should you require assistance from our support team to troubleshoot issues related to the Liquid Loom Generator or Connector, you may be requested to provide sample data to help us replicate the problem on our end. We kindly advise excluding any sensitive data from these samples.
Regarding our Integration as a Service, we may access data for up to 90 days after it entered our systems, but rest assured that this will only occur if requested by you. Access to this data is strictly limited to authorized personnel on our team. Additionally, we implement thorough logging of all data usage and enforce 2-factor authentication for all staff members to ensure the highest level of security and accountability.
Rest assured, your data is safeguarded both during transit and while at rest. At Weavo, we employ robust encryption measures to ensure the security of your information. Our services utilize 256-bit AES encryption for transient data storage and employ SHA-256 with RSA Encryption SSL certificates across all API services. Additionally, all our API services adhere to TLS1.2 as the minimum standard and strictly enforce the HTTPS protocol.
Your data will be processed in the nearest Azure data center where Weavo maintains a presence by default. Currently, our services are operational in Azure data centers located in:
We utilize Azure Front Door for request management and distribution.
Weavo relies exclusively on Microsoft Azure 'PaaS' so your data will never leave a Microsoft data center. By leveraging Microsoft Azure 'PaaS' services, Weavo maximizes the utilization of all native Microsoft Azure security features.
Many of our customers seek clarity on how their data is handled within our services. This article aims to instill confidence by furnishing you with the essential information needed for understanding this process.
We tailor our approach to data handling based on the specific service you're utilizing from Weavo.
Liquid Loom Generator and Connector
For our Liquid Loom generator and connector, rest assured that we don't retain any of your data beyond processing. The Liquid Loom operates in a stateless manner, meaning that once your input data is processed and a response is delivered, it's promptly and permanently removed from our systems.
Integrations delivered as a service
In the case of customers subscribed to our "integration as a service" offering, where we facilitate integrations between applications, we temporarily store all data passing through the integration for 90 days. This allows us to promptly address any potential issues that may arise. Following this period, all data is securely and permanently deleted from our systems.
You can learn more in the Data Processing Agreement (DPA)
We cannot access any data which is sent to our services, Liquid Loom Generator or Connector.
Should you require assistance from our support team to troubleshoot issues related to the Liquid Loom Generator or Connector, you may be requested to provide sample data to help us replicate the problem on our end. We kindly advise excluding any sensitive data from these samples.
Regarding our Integration as a Service, we may access data for up to 90 days after it entered our systems, but rest assured that this will only occur if requested by you. Access to this data is strictly limited to authorized personnel on our team. Additionally, we implement thorough logging of all data usage and enforce 2-factor authentication for all staff members to ensure the highest level of security and accountability.
Rest assured, your data is safeguarded both during transit and while at rest. At Weavo, we employ robust encryption measures to ensure the security of your information. Our services utilize 256-bit AES encryption for transient data storage and employ SHA-256 with RSA Encryption SSL certificates across all API services. Additionally, all our API services adhere to TLS1.2 as the minimum standard and strictly enforce the HTTPS protocol.
Your data will be processed in the nearest Azure data center where Weavo maintains a presence by default. Currently, our services are operational in Azure data centers located in:
We utilize Azure Front Door for request management and distribution.
Weavo relies exclusively on Microsoft Azure 'PaaS' so your data will never leave a Microsoft data center. By leveraging Microsoft Azure 'PaaS' services, Weavo maximizes the utilization of all native Microsoft Azure security features.
Many of our customers seek clarity on how their data is handled within our services. This article aims to instill confidence by furnishing you with the essential information needed for understanding this process.
We tailor our approach to data handling based on the specific service you're utilizing from Weavo.
Liquid Loom Generator and Connector
For our Liquid Loom generator and connector, rest assured that we don't retain any of your data beyond processing. The Liquid Loom operates in a stateless manner, meaning that once your input data is processed and a response is delivered, it's promptly and permanently removed from our systems.
Integrations delivered as a service
In the case of customers subscribed to our "integration as a service" offering, where we facilitate integrations between applications, we temporarily store all data passing through the integration for 90 days. This allows us to promptly address any potential issues that may arise. Following this period, all data is securely and permanently deleted from our systems.
You can learn more in the Data Processing Agreement (DPA)
We cannot access any data which is sent to our services, Liquid Loom Generator or Connector.
Should you require assistance from our support team to troubleshoot issues related to the Liquid Loom Generator or Connector, you may be requested to provide sample data to help us replicate the problem on our end. We kindly advise excluding any sensitive data from these samples.
Regarding our Integration as a Service, we may access data for up to 90 days after it entered our systems, but rest assured that this will only occur if requested by you. Access to this data is strictly limited to authorized personnel on our team. Additionally, we implement thorough logging of all data usage and enforce 2-factor authentication for all staff members to ensure the highest level of security and accountability.
Rest assured, your data is safeguarded both during transit and while at rest. At Weavo, we employ robust encryption measures to ensure the security of your information. Our services utilize 256-bit AES encryption for transient data storage and employ SHA-256 with RSA Encryption SSL certificates across all API services. Additionally, all our API services adhere to TLS1.2 as the minimum standard and strictly enforce the HTTPS protocol.
Your data will be processed in the nearest Azure data center where Weavo maintains a presence by default. Currently, our services are operational in Azure data centers located in:
We utilize Azure Front Door for request management and distribution.
Weavo relies exclusively on Microsoft Azure 'PaaS' so your data will never leave a Microsoft data center. By leveraging Microsoft Azure 'PaaS' services, Weavo maximizes the utilization of all native Microsoft Azure security features.