CINXE.COM

Clearbit’s Commitment to Trust

<!DOCTYPE html><html lang="en" style="--font-text:InterVar;--font-heading:InterDisplay"><head><meta charSet="UTF-8"/><meta name="viewport" content="width=device-width, initial-scale=1.0"/><title>Clearbit’s Commitment to Trust</title><meta name="robots" content="noindex,follow"/><meta name="description" content="At Clearbit, your data always remains your data. We do our best to safeguard it by investing in security and honoring privacy principles as core tenets of our business. Our Trust Center provides helpful information about our legal terms of service, data privacy and compliance practices, security measures and our service performance. We&#x27;re here to help!"/><meta property="og:title" content="Clearbit’s Commitment to Trust"/><meta property="og:description" content="At Clearbit, your data always remains your data. We do our best to safeguard it by investing in security and honoring privacy principles as core tenets of our business. Our Trust Center provides helpful information about our legal terms of service, data privacy and compliance practices, security measures and our service performance. We&#x27;re here to help!"/><meta property="og:url" content="/trust"/><meta property="og:type" content="website"/><meta property="og:image" content="/sharing/social-share-2.jpg"/><meta property="og:image:alt" content="Clearbit’s Commitment to Trust"/><meta property="og:image:width" content="1200"/><meta property="og:image:height" content="630"/><link rel="canonical" href="/trust"/><meta name="next-head-count" content="14"/><script> var REVEAL_TIMEOUT = 10000; window.revealHasLoaded = false; function constructRevealPromise() { window.revealLoadedPromise = new Promise(function(resolve, reject){ window.revealLoadedResolver = resolve; setTimeout(function(){ if (!window.revealHasLoaded) { window.revealHasLoaded = true; reject(new Error('Reveal timeout')); } }, REVEAL_TIMEOUT); }).then(function(revealData){ window.revealHasLoaded = true; return revealData; }); } if (typeof window.Promise === 'undefined') { var scriptElement = document.createElement('script'); scriptElement.src = 'https://cdn.jsdelivr.net/npm/promise-polyfill@8/dist/polyfill.min.js'; scriptElement.onload = constructRevealPromise; document.head.appendChild(scriptElement); } else { constructRevealPromise(); } window.revealCallback = function(revealData){ if (typeof window.revealLoadedResolver !== 'undefined') { window.revealLoadedResolver(revealData); } } </script><script defer="" src="https://tag.clearbitscripts.com/v1/pk_a7bb4cb2fcda3017eb148eeffe8438d7/tags.js" referrerPolicy="strict-origin-when-cross-origin"></script><link rel="shortcut icon" href="/favicon.ico"/><link rel="icon" href="/favicon-192.png" sizes="192x192"/><link rel="apple-touch-icon" href="/apple-touch-icon.png"/><link rel="preload" href="/fonts/Inter/InterVariable.woff2?v=4.0" as="font" type="font/woff2" crossorigin="anonymous"/><link rel="preload" href="/_next/static/css/4d71feef90241bc0.css" as="style"/><link rel="stylesheet" href="/_next/static/css/4d71feef90241bc0.css" data-n-g=""/><noscript data-n-css=""></noscript><script defer="" nomodule="" src="/_next/static/chunks/polyfills-c67a75d1b6f99dc8.js"></script><script src="/_next/static/chunks/webpack-f6e49b46b50dfa96.js" defer=""></script><script src="/_next/static/chunks/framework-f44ba79936f400b5.js" defer=""></script><script src="/_next/static/chunks/main-949fe9b575e4899e.js" defer=""></script><script src="/_next/static/chunks/pages/_app-45f8e7985c4a5ff0.js" defer=""></script><script src="/_next/static/chunks/05d954cf-a67b97b0fe6f1a64.js" defer=""></script><script src="/_next/static/chunks/9d928d29-b30937b49b9a1e9e.js" defer=""></script><script src="/_next/static/chunks/7511dfe0-16768cd3a786b20b.js" defer=""></script><script src="/_next/static/chunks/4a3ea9cd-564654af72d74ddd.js" defer=""></script><script src="/_next/static/chunks/75fc9c18-2a61f47d21a1bfe0.js" defer=""></script><script src="/_next/static/chunks/9112-3660e18e28fec41d.js" defer=""></script><script src="/_next/static/chunks/2962-025dd141f7815e28.js" defer=""></script><script src="/_next/static/chunks/1664-402522dac0871a46.js" defer=""></script><script src="/_next/static/chunks/9368-66184628b9cd2ac0.js" defer=""></script><script src="/_next/static/chunks/5959-061951a9ccaa5781.js" defer=""></script><script src="/_next/static/chunks/9379-81ceb18fd73b6bc4.js" defer=""></script><script src="/_next/static/chunks/2217-01f87bc622788083.js" defer=""></script><script src="/_next/static/chunks/8764-41917a587df94433.js" defer=""></script><script src="/_next/static/chunks/4824-7d740493e09d388e.js" defer=""></script><script src="/_next/static/chunks/722-4235219901640bee.js" defer=""></script><script src="/_next/static/chunks/7813-39465dc0542ce74f.js" defer=""></script><script src="/_next/static/chunks/4091-69e9fb4a29cd8818.js" defer=""></script><script src="/_next/static/chunks/8472-5bbc82a37e854f1d.js" defer=""></script><script src="/_next/static/chunks/pages/trust-32725d41a25665f0.js" defer=""></script><script src="/_next/static/iJMlTHsUA9mH17w2H2ORb/_buildManifest.js" defer=""></script><script src="/_next/static/iJMlTHsUA9mH17w2H2ORb/_ssgManifest.js" defer=""></script></head><body><div id="__next" data-reactroot=""><svg class="sr-only"><filter id="animDropShadow" height="130%"><feGaussianBlur in="SourceAlpha" stdDeviation="20"></feGaussianBlur><feOffset dx="0" dy="15" result="offsetblur"></feOffset><feComponentTransfer><feFuncA type="linear" slope="0.07"></feFuncA></feComponentTransfer><feMerge><feMergeNode></feMergeNode><feMergeNode in="SourceGraphic"></feMergeNode></feMerge></filter><filter id="animDropShadowSm" height="130%"><feGaussianBlur in="SourceAlpha" stdDeviation="12"></feGaussianBlur><feOffset dx="0" dy="8" result="offsetblur"></feOffset><feComponentTransfer><feFuncA type="linear" slope="0.08"></feFuncA></feComponentTransfer><feMerge><feMergeNode></feMergeNode><feMergeNode in="SourceGraphic"></feMergeNode></feMerge></filter></svg><div id="top" class="antialiased overflow-hidden flex flex-col min-h-screen text-[#091135] text-md max-w-full leading-normal "><header class="fixed w-full z-[1000] bg-white"><nav class=" transition duration-300 py-4 px-4 "><div class="max-w-7xl flex items-center justify-between mx-auto"><a class="inline-flex items-center" href="/"><img src="/clearbit_by_hubspot.png" alt="Clearbit by HubSpot" width="160"/></a><a class=" ck-button-new ck-button-new--bold--blue px-4 py-2 rounded-md text-sm font-medium bg-blue-600 text-white hover:bg-blue-700 transition duration-300 ease-in-out " href="/login">Clearbit customer login</a></div></nav></header><section class="section-bg-base section-bg-blurred-green-spots-1" style="--layoutWidth:51rem"><div class="main-container text-center pt-32 md:pt-36 overflow-hidden !pb-24 !pt-44 "><div class="flex flex-col items-center"><div class=" relative mb-10 modular-page-markdown modular-page-markdown-hero"><h1 class="ck-h1-new mb-8">Clearbit’s Commitment <br/>to Trust</h1> <p class="md:text-lg lg:text-xl" style="margin-bottom:1.5rem !important"> We do our best to safeguard it by investing in security and honoring privacy principles as core tenets of our business. Our Trust Center provides helpful information about our legal terms of service, data privacy and compliance practices, security measures and our service performance. We&#x27;re here to help! </p></div><div class="lg:flex-row lg:justify-start lg:space-y-0 lg:space-x-4 flex flex-col items-center justify-center space-y-4"><a class="ck-button-new ck-button-new--bold--blue cursor-pointer" target="_blank" rel="noreferrer" href="mailto:partnerships@clearbit.com?subject=Become%20a%20Clearbit%20Partner"><span>Become a partner</span></a></div></div></div></section><div class="main-container md:mb-20 md:mt-16 md:space-x-16 thin-scrollbar mb-11 max-w-full pb-4 space-x-8 overflow-x-auto text-center"><a class="lg:text-2xl text-lg font-bold leading-9 cursor-pointer md:border-b-2 pb-2 text-[#015CFF] border-[#015CFF]" href="/trust#legal">Legal</a><a class="lg:text-2xl text-lg font-bold leading-9 cursor-pointer md:border-b-2 pb-2 border-transparent" href="/trust#data-governance-and-privacy-at-clearbit">Privacy</a><a class="lg:text-2xl text-lg font-bold leading-9 cursor-pointer md:border-b-2 pb-2 border-transparent" href="/trust#compliance">Compliance</a><a class="lg:text-2xl text-lg font-bold leading-9 cursor-pointer md:border-b-2 pb-2 border-transparent" href="/trust#security">Security</a><a class="lg:text-2xl text-lg font-bold leading-9 cursor-pointer md:border-b-2 pb-2 border-transparent" href="/trust#status">Status</a></div><section class="section-bg-base pt-8 mb-36 text-center section-bg-navy-ellipse"><div class=" main-container modular-page-markdown modular-page-markdown-extended"><h2 id="legal">Legal</h2> <p style="margin-bottom:4rem"> The below are the key legal documents and policies that govern Clearbit’s services: </p> <div class="modular-page-markdown flex flex-wrap gap-16 justify-around"></div></div></section><section class="main-container lg:mb-40 mb-24 " style="scroll-margin-top:80px"><div class=" relative mb-10 modular-page-markdown modular-page-markdown-extended "><h3 id="data-governance-and-privacy-at-clearbit">Data Governance and Privacy at Clearbit</h3> <h4 id="overview">Overview</h4> <p>Clearbit is a B2B marketing data engine that helps businesses discover and attract more ideal prospects, personalize their marketing and sales interactions, and enrich and inform their go-to-market systems.</p> <p>Our Services are designed to help our customers and partners in a wide variety of ways, including by helping them determine which companies might make the best customers, identify the contacts within those organizations by department, role or seniority that might improve or expedite their interactions with those companies, and enabling them to personalize their interactions with those companies.</p> <p>Clearbit processes B2B data for your use within a business context, regardless of where an individual is based, across all of our solutions. This is essentially information that is available on someone’s business card, email signatures or company websites. Clearbit does not collect or process sensitive personal data, such as health records, financial information, or economic status.</p> <p>Our proprietary indexing systems (&quot;Clearbit Indexers&quot;) collect information from a variety of sources in order to compile &quot;Attribute Data&quot; about corporations, non-profits, and similar entities (&quot;Companies&quot;) and the professionals that work for them (&quot;Professionals&quot;). A complete list of Attribute Data we make available to users of the Site and Services (defined below) can be found at <a href="https://clearbit.com/attributes">www.clearbit.com/attributes</a>.</p> <p>Clearbit acquires the data used in our Services from our customers that use certain enrichment services, public datasets, third-party paid sources and when users use our free tools such as Clearbit Connect.</p> <h4 id="data-privacy">Data Privacy</h4> <p>At Clearbit, privacy and security are top priorities for us. Clearbit understands the importance of protecting the critical business and personal information entrusted to Clearbit by its customers.</p> <p>Clearbit is a registered data broker in California, and is subject to CCPA (California Consumer Privacy Act) and other applicable US privacy laws. We’re aligned with the General Data Protection Regulation (GDPR) principles. We continue to bolster our already-strong data protection practices by continuously evaluating and updating our company privacy policies and practices.</p> <p>For privacy inquiries, please contact <a href="mailto:privacy@clearbit.com">privacy@clearbit.com</a>.</p> <div class="flex mt-10 space-x-6"> <img src="https://images.ctfassets.net/osv85d77hkdf/3nROiN89ifejgvTrZS9MAP/82ea7dd6ffb295ba1ede2d8eb35b33b4/ccpa.svg" alt="ccpa logo" class="h-24 w-24"/> <img src="https://images.ctfassets.net/osv85d77hkdf/3WzzlTaFBTWrpVH5JIktNu/384f9272da807a3b63a0d06f49a04065/gdpr.svg" alt="gdpr logo" class="h-24 w-24"/> <img src="https://images.ctfassets.net/osv85d77hkdf/40g72vp2kpHcizuPP8TyVW/bb32ef744f6b37a7f86e7e03eab26873/21972-312_SOC_NonCPA.png" alt="soc logo" class="h-24 w-24"/> </div> <h4 id="clearbit-and-the-gdpr">Clearbit and the GDPR</h4> <p>The <a href="http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=uriserv:OJ.L_.2016.119.01.0001.01.ENG&amp;toc=OJ:L:2016:119:TOC">EU&#x27;s General Data Protection Regulation (GDPR)</a> strengthens the rights of EU individuals regarding how their personal data is used &amp; collected.</p> <p>Clearbit is headquartered in the United States. However, some of our enterprise customers may be based in the EU or engage in other activities that require them to comply with the GDPR.</p> <p>Today, thousands of organizations rely on Clearbit as the data backbone for their cutting-edge sales &amp; marketing efforts. We know that our customers take GDPR seriously and need vendors that can help accommodate their GDPR needs. Our legal, operations, and product teams therefore, consistently ensure that we have appropriate product safeguards, policies, and knowledge to facilitate our customers&#x27; continued use of Clearbit via our Platform and APIs.</p> <p>Today, thousands of organizations rely on Clearbit as the data backbone for their cutting-edge sales &amp; marketing efforts. We know that our customers take GDPR seriously and need vendors that can help accommodate their GDPR needs. Our legal, operations, and product teams therefore, consistently ensure that we have appropriate product safeguards, policies, and knowledge to facilitate our customers&#x27; continued use of Clearbit via our Platform and APIs.</p> <h5 id="legal-basis">Legal basis</h5> <p>Some elements of Attribute Data are not collected from data subjects directly; the legal basis for which Clearbit’s processes such data includes the legitimate interest of both Clearbit and its business customers, among other legal bases as applicable depending on the context. Clearbit’s data is processed to provide business intelligence (for sales, marketing, and operations) and help organizations drive revenue by providing users with accurate and up-to-date business information.</p> <h5 id="legitimate-interest">Legitimate Interest</h5> <p>Many advanced privacy regimes require that personal data must be obtained and processed lawfully and fairly. Personal data should be collected and processed based on a legitimate purpose, after balancing the interests of the organization against the interests and rights of the individual whose data is processed.</p> <p>The data collected by Clearbit is limited and does not contain any special categories of personal data or data related to children.</p> <p>Although any personal information about data subjects that we provide our customers access to can be found on business social platforms or during the course of normal business correspondence, we do not collect data directly from the data subjects. As a result, they may not know that their data is in our database. They can always exercise their rights in relation to their data through our <a href="https://preferences.clearbit.com/privacy">Privacy Request Form</a>.</p> <p>Finally, Clearbit follows data minimization principles and only collects data that are strictly necessary to achieve its purposes. Clearbit has processes in place to limit the data processed to business contact information which is professional in nature. Through our <a href="https://preferences.clearbit.com/privacy">Privacy Request Form</a>, individuals can claim control over their data.</p> <h4 id="data-subject-rights">Data subject rights</h4> <p>Clearbit operates in accordance with fundamental privacy principles that underlie global privacy regulations, with respect to an individual’s right to know what personal data is collected and how it is used or otherwise processed. Clearbit has features that support customers&#x27; ability to handle data subject requests, such as requests for access, correction, or erasure, by allowing individuals to access and modify applicable personal information via our <a href="https://preferences.clearbit.com/privacy">Privacy Request Form</a>.</p> <h4 id="data-deletion-and-retention">Data deletion and retention</h4> <p>Clearbit periodically verifies the accuracy of all of the information in its databases. Data that is found to be inaccurate or out of date is removed from the database. In addition, we honor all opt-out requests so if any person requests deletion of their data, then such data would be deleted.</p> <p>When a customer terminates their contract with us, upon request, we delete their account and remove any associations of such customer with any data in our databases promptly, and no later than 90 days of termination of their contract.</p> <h4 id="data-access">Data access</h4> <p>Clearbit enforces the “rule of least privilege” and has documented segregation of duties. We also enforce formal logical and account separation of the development, QA and production environments.</p> <h4 id="data-residency">Data residency</h4> <p>Currently, Clearbit stores all its data in servers of US-based cloud companies. The GDPR doesn’t require personal data of EU citizens and residents to be only stored within the EU.</p> <h4 id="subprocessors">Subprocessors</h4> <p>We maintain a list of the <a href="https://clearbit.com/subprocessors">subprocessors</a> that we use as part of our products and services, including the activities and services performed by such subprocessors and their country location.</p> <h4 id="privacy-notices">Privacy notices</h4> <p>Our privacy policy is available at <a href="https://clearbit.com/privacy">https://clearbit.com/privacy</a>.</p> <p>We operate in accordance with internal privacy and data protection policies that are based on privacy principles that underlie international privacy regimes, including the GDPR and the California Consumer Privacy Act (CCPA). We actively monitor and intend to comply with any new applicable privacy laws.</p> <h4 id="training-and-awareness">Training and awareness</h4> <p>We require annual privacy and security training that’s mandatory for all Clearbit personnel. These trainings are actively tracked and regularly reviewed to help ensure compliance and relevance for our business activities. We also deliver periodic privacy and security communications to supplement required trainings, further reinforcing data privacy and data security best practices.</p> <h4 id="governance-and-accountability">Governance and accountability</h4> <p>Clearbit’s privacy program is directed and overseen by the DPO , and a team of dedicated professionals. IAPP-certified privacy professionals review company activity with privacy and data protection implications, assess compliance and make recommendations to help meet compliance requirements.</p> <h4 id="privacy-by-design">Privacy by design</h4> <p>Our product and engineering teams work closely with our global privacy team to embed privacy principles in our products and services and help ensure privacy compliance with respect to the various phases of product development, starting at concept, through requirements gathering, to implementation and release. Beyond product development activities, our privacy team drives our privacy by design approach on a corporate-wide basis, including assessing a variety of activities across the company involving personal data for privacy compliance.</p></div></section><section class="main-container lg:mb-40 mb-24 md:flex lg:flex-row md:flex-row-reverse" style="scroll-margin-top:80px"><div class=" relative mb-10 modular-page-markdown modular-page-markdown-extended md:pl-16 lg:pl-0 lg:pr-16 md:flex-1"><h3 id="compliance">Compliance</h3> <p>People, process and technology are all considerations in how we approach information security and data privacy. To validate the effectiveness of our internal security controls, we engaged an independent auditor to assess our compliance with a framework which is specifically designed for software-as-a-service (SaaS) providers. Our security program is evaluated using AICPA’s SOC 2 Trust Services Criteria aligned with the controls contained in the COSO 2013 framework.</p> <p>Clearbit is SOC 2 Type 2 Compliant</p></div><div class="lg:w-[23rem] lg:h-[23rem] flex items-center justify-center rounded-2xl relative overflow-hidden lg:shadow" style="--tw-shadow:0 15px 40px rgba(25, 69, 173, 0.1)"><img class="md:w-56 w-40" src="//images.ctfassets.net/osv85d77hkdf/1ZQet7lV4muBwgW2snIAm6/9e29b8816cdccc2abb32803cac69d68d/aicpa_soc.jpg" alt="AICPA SOC"/></div></section><section class="main-container lg:mb-40 mb-24 " style="scroll-margin-top:80px"><div class=" relative mb-10 modular-page-markdown modular-page-markdown-extended "><h3 id="security">Security</h3> <p>Clearbit has implemented a security strategy that is largely influenced by emerging trends in the cybersecurity field and common threats that impact businesses in the technology sector. We maintain a security team which provides executive-level oversight and approval for security and compliance policy initiatives.</p> <h4 id="personnel-security">Personnel Security</h4> <p>We perform comprehensive background screenings on all new employees. All employees are required to sign non-disclosure agreements at the time of hire. Completion of our awareness and training program is required for all new hires as part of their onboarding plan. Ongoing refresher training activities are carried out throughout the year and participation is tracked. </p> <h4 id="cloud-and-network-architecture">Cloud and Network Architecture</h4> <p>Clearbit utilizes Amazon Web Services and Google Cloud Platform data centers located in the United States.</p> <p>The AWS and GCP cloud infrastructure has been designed and managed in compliance with regulations, standards, and best practices, including SOC 2, ISO 27001, FedRAMP, GDPR, CCPA, and PCI DSS Level 1. Please visit here to learn more about the security standards and frameworks that our cloud data centers comply with: <a href="https://aws.amazon.com/compliance/programs/">https://aws.amazon.com/compliance/programs/</a> <a href="https://cloud.google.com/security/compliance">https://cloud.google.com/security/compliance</a></p> <p>The application is architected, at a minimum, with N+1 redundancy for network and power failover protection. All servers, firewalls, switches, load balancers, and routers are fully redundant. In the event of component failure, a redundant counterpart is available to handle the load, so our systems remain available.</p> <h4 id="securing-clearbit-applications">Securing Clearbit Applications</h4> <p>We engage third-party security experts to perform penetration tests on an annual basis and vulnerability scanning is performed on a regular basis. Clearbit adheres to a Software Development Lifecycle Policy. Code is evaluated for design, functionality, and common security exposures. Changes to the source code are governed by standardized change management processes. In addition to automated and manual testing, our code is peer reviewed prior to being deployed to production.</p> <p>Clearbit’s APIs are designed to deliver a highly available, scalable solution for customers, while maintaining core security protections. </p> <p>Clearbit imposes a number of rate limiting controls to automatically block malicious traffic and protect accounts from abuse.</p> <h4 id="protecting-customer-data">Protecting Customer Data</h4> <p>Clearbit supports TLS v1.2 and TLS v1.3 encryption to protect communications. Data is encrypted at rest using AES-256 bit encryption while in storage. </p> <p>Clearbit limits the number of personnel with access to information systems containing sensitive data. Access to customer data is provisioned only where a requirement to fulfill job duties exists (e.g. respond to a customer support case, resolve a technical issue requiring engineering input). </p> <h4 id="physical-and-environmental-protection">Physical and Environmental Protection</h4> <p>Physical access controls are implemented and include electronic access doors, video surveillance, security guards, visitor access controls, and security zones.</p> <p>Data center equipment is protected from environmental threats using automatic fire detection and suppression equipment, climate control which prevents overheating and reduces the possibility of service outages, water leakage detection and removal and uninterruptible Power Supply (UPS) units to provide back-up power in the event of an electrical failure.</p> <h4 id="monitoring">Monitoring</h4> <p>We have implemented application health monitoring alerts to aid in detecting operational incidents early. Incident response procedures are defined, documented, and approved by management.</p> <h4 id="business-continuity--disaster-recovery">Business Continuity &amp; Disaster Recovery</h4> <p>Customer data is backed up using automated policy-based scheduling and protected using AES-256 bit encryption. Clearbit has a disaster recovery plan that outlines roles and responsibilities for key personnel involved in business continuity, our plan to activate and respond to a disaster, target timelines and testing requirements.</p> <h4 id="supplier-security">Supplier Security</h4> <p>Our goal is to ensure our suppliers can uphold the same level of commitment to customers that we promise. We have established a Vendor Risk Management program that is used to evaluate new sub processors and monitor existing sub processors on an annual basis. Selection and renewal of sub processors require approval from multiple stakeholders to manage risk.</p> <h4 id="incident-reporting">Incident Reporting</h4> <p>If you have any questions about Clearbit’s security program or you need to escalate a security concern, please contact us at security@clearbit.com or by phone to (888) 237-8136. We have a team responsible for security incident response that can assist.</p></div></section><section class="main-container " style="scroll-margin-top:80px"><div class=" relative mb-10 modular-page-markdown modular-page-markdown-extended "><h3 id="status">Status</h3> <p>You can subscribe to real-time notifications about operational incidents and access status information about performance by visiting our status page at <a href="https://status.clearbit.com/uptime">https://status.clearbit.com/uptime</a>.</p></div></section><section id="get-started" class="main-container lg:py-40 md:py-32 md:flex relative items-center justify-center py-24"><img class="max-w-none h-[600px] left-64 bottom-12 absolute my-auto opacity-30" src="/images/homepage/form-background-dark.svg" alt="colors-background"/><img class="hidden mix-blend-overlay md:block max-w-none h-[386px] left-0 bottom-24 absolute w-full opacity-10" src="/images/homepage/form-background-dots.svg" alt="dots-background"/><img class="max-w-none h-[874px] left-2 -bottom-24 absolute my-auto" src="/images/homepage/form-background-colors.svg" alt="colors-background"/><div class="rounded-3xl md:mx-0 md:p-4 relative max-w-xl p-0 mx-auto"><div class="hidden md:block rounded-3xl absolute top-[20%] left-[-5%] bg-white border w-[110%] h-[60%]"></div><div class="hidden md:block rounded-3xl absolute top-[10%] left-[-1%] bg-white border w-[102%] h-[80%]"></div><div class="rounded-b-md md:rounded-3xl md:border relative bg-white border-t"><div class="contact-component relative bg-white min-h-[30rem] rounded-3xl flex flex-col pt-10 pb-6 px-6 md:px-10 lg:px-12 max-w-xl"><form><header class="text-[#2C303E] text-center"><div class="ck-box z-10 w-16 h-16 m-auto mb-6 flex justify-center items-center rounded-xl shadow-none"><svg xmlns="http://www.w3.org/2000/svg" width="40" height="40" viewBox="0 0 40 40" class="w-12 h-12 mx-auto"><defs><linearGradient id="clearbit-a" x1="50%" x2="100%" y1="0%" y2="100%"><stop offset="0%" stop-color="#DEF2FE"></stop><stop offset="100%" stop-color="#DBF1FE"></stop></linearGradient><linearGradient id="clearbit-b" x1="0%" x2="50%" y1="0%" y2="100%"><stop offset="0%" stop-color="#57BCFD"></stop><stop offset="100%" stop-color="#51B5FD"></stop></linearGradient><linearGradient id="clearbit-c" x1="37.5%" x2="62.5%" y1="0%" y2="100%"><stop offset="0%" stop-color="#1CA7FD"></stop><stop offset="100%" stop-color="#148CFC"></stop></linearGradient><filter id="ck-icon-shadow" x="-50%" y="-50%" width="200%" height="200%"><feOffset result="offOut" in="SourceGraphic" dx="0" dy="1"></feOffset><feGaussianBlur result="blurOut" in="offOut" stdDeviation="1"></feGaussianBlur><feBlend in="SourceGraphic" in2="blurOut" mode="normal"></feBlend></filter></defs><g fill="none"><path d="M27.9195733,37 L12.0804267,37 L11.4338943,36.9949826 C8.75934941,36.9515623 7.69554096,36.6271471 6.62367147,36.053905 C5.46935048,35.4365674 4.56343261,34.5306495 3.94609499,33.3763285 L3.81824005,33.1283803 C3.30403747,32.0897188 3.02217708,30.9433817 3.00125617,28.250264 L3,12.0804267 C3,8.92296455 3.32875737,7.77799245 3.94609499,6.62367147 C4.56343261,5.46935048 5.46935048,4.56343261 6.62367147,3.94609499 L6.87161969,3.81824005 C7.91028124,3.30403747 9.05661831,3.02217708 11.749736,3.00125617 L27.9195733,3 C31.0770355,3 32.2220075,3.32875737 33.3763285,3.94609499 C34.5306495,4.56343261 35.4365674,5.46935048 36.053905,6.62367147 L36.18176,6.87161969 C36.6959625,7.91028124 36.9778229,9.05661831 36.9987438,11.749736 L37,27.9195733 L36.9949826,28.5661057 C36.9515623,31.2406506 36.6271471,32.304459 36.053905,33.3763285 C35.4365674,34.5306495 34.5306495,35.4365674 33.3763285,36.053905 L33.1283803,36.18176 C32.0481723,36.7165306 30.8515024,37 27.9195733,37 Z" id="clearbit-edge" stroke-opacity="0.2" stroke="#9BADBC" fill-opacity="0" fill="#9BADBC"></path><path d="M27.9195733,37 L12.0804267,37 L11.4338943,36.9949826 C8.75934941,36.9515623 7.69554096,36.6271471 6.62367147,36.053905 C5.46935048,35.4365674 4.56343261,34.5306495 3.94609499,33.3763285 L3.81824005,33.1283803 C3.30403747,32.0897188 3.02217708,30.9433817 3.00125617,28.250264 L3,12.0804267 C3,8.92296455 3.32875737,7.77799245 3.94609499,6.62367147 C4.56343261,5.46935048 5.46935048,4.56343261 6.62367147,3.94609499 L6.87161969,3.81824005 C7.91028124,3.30403747 9.05661831,3.02217708 11.749736,3.00125617 L27.9195733,3 C31.0770355,3 32.2220075,3.32875737 33.3763285,3.94609499 C34.5306495,4.56343261 35.4365674,5.46935048 36.053905,6.62367147 L36.18176,6.87161969 C36.6959625,7.91028124 36.9778229,9.05661831 36.9987438,11.749736 L37,27.9195733 L36.9949826,28.5661057 C36.9515623,31.2406506 36.6271471,32.304459 36.053905,33.3763285 C35.4365674,34.5306495 34.5306495,35.4365674 33.3763285,36.053905 L33.1283803,36.18176 C32.0481723,36.7165306 30.8515024,37 27.9195733,37 Z" id="clearbit-fx" fill-opacity="0.2" fill="#9BADBC" filter="url(#ck-icon-shadow)"></path><path fill="url(#clearbit-a)" d="M37,20 L37,27.9195733 C37,31.0770355 36.6712426,32.2220075 36.053905,33.3763285 C35.4365674,34.5306495 34.5306495,35.4365674 33.3763285,36.053905 C32.2220075,36.6712426 31.0770355,37 27.9195733,37 L20,37 L20,20 L37,20 Z"></path><path fill="url(#clearbit-b)" d="M20,3 L27.9195733,3 C31.0770355,3 32.2220075,3.32875737 33.3763285,3.94609499 C34.5306495,4.56343261 35.4365674,5.46935048 36.053905,6.62367147 C36.6712426,7.77799245 37,8.92296455 37,12.0804267 L37,20 L20,20 L20,3 Z"></path><path fill="url(#clearbit-c)" d="M12.0804267,3 L20,3 L20,37 L12.0804267,37 C8.92296455,37 7.77799245,36.6712426 6.62367147,36.053905 C5.46935048,35.4365674 4.56343261,34.5306495 3.94609499,33.3763285 C3.32875737,32.2220075 3,31.0770355 3,27.9195733 L3,12.0804267 C3,8.92296455 3.32875737,7.77799245 3.94609499,6.62367147 C4.56343261,5.46935048 5.46935048,4.56343261 6.62367147,3.94609499 C7.77799245,3.32875737 8.92296455,3 12.0804267,3 Z"></path></g></svg></div><h3 class="mb-6 text-2xl font-semibold">Ready to chat?</h3><p class="mt-5 mb-4 text-base">See how the world&#x27;s fastest-growing companies use Clearbit to power efficient revenue engines.</p></header><div><label class="row block overflow-hidden text-left flex flex-col flex-wrap flex-auto opacity-100 mb-5" data-test="email"><span class="text-[#36394A] mb-1 text-sm font-medium">Email</span><input type="email" class="appearance-none block bg-white flex-auto rounded-lg outline-none px-1 md:px-3 h-10 text-sm border border-gray-200 focus:border-blue-500 placeholder-gray-400" name="email" placeholder="you@company-email.com" pattern="^(?!.*(gmail|hotmail|yahoo)).*$" value="" required=""/></label><label class="row block overflow-hidden text-left flex flex-col flex-wrap flex-auto opacity-0 h-0" data-test="name"><span class="text-[#36394A] mb-1 text-sm font-medium">Name</span><input type="text" class="appearance-none block bg-white flex-auto rounded-lg outline-none px-1 md:px-3 h-10 text-sm border border-gray-200 focus:border-blue-500 placeholder-gray-400" name="name" placeholder="Your name" value="" data-hj-whitelist="true" disabled=""/></label></div><footer class="md:flex-row flex flex-col-reverse items-center justify-between"><div class="w-full"><button type="submit" class="ck-button-new ck-button-new--bold--blue ck-button-new--small w-full">Submit</button><p class="mt-3 text-xs text-center text-gray-500">To learn how Clearbit handles your information,<br/> please see our<!-- --> <a target="_blank" class="hover:opacity-75 whitespace-nowrap hover:underline text-blue-600" href="/privacy">privacy policy</a>.</p></div></footer><div class="text-right text-sm "></div></form></div></div></div></section><footer class="z-10 antialiased font-medium"><hr class="border-none h-[1px] mt-10 w-full bg-gray-100"/><div class="main-container pb-11 md:pb-16 md:flex flex-wrap items-start pt-16"><div class="flex items-center md:w-4/12 md:pr-10 lg:w-1/4 mb-12"><a class="relative z-10 inline-flex items-center flex-1 h-full font-bold cursor-pointer" href="/"><img alt="Clearbit by HubSpot" src="/clearbit_by_hubspot.png" width="160"/></a></div><div class="flex flex-flow flex-1 max-h-[1400px] sm:max-h-[1060px] lg:max-h-[800px] -ml-8 md:-ml-10" style="flex-flow:row wrap"><div class="lg:w-1/3 md:pl-10 w-1/2 pl-8 mb-8 "><h5 class="text-[#666D80] mb-3 font-normal text-sm">Resources</h5><a class="block text-sm hover:opacity-[65%] mb-4 " href="/blog">Blog</a><a class="block text-sm hover:opacity-[65%] mb-4 " href="/resources/tools">Free Tools</a><a class="block text-sm hover:opacity-[65%] mb-4 " href="/resources/guides">Guides</a><a class="block text-sm hover:opacity-[65%] mb-4 " href="/resources/books">Books</a><a class="block text-sm hover:opacity-[65%] mb-4 " href="/resources/webinars">Webinars</a><a class="block text-sm hover:opacity-[65%] mb-4 " href="/resources/landing/newsletter">Newsletter</a><a class="block text-sm hover:opacity-[65%] mb-4 " href="/changelog">Release Notes</a></div><div class="lg:w-1/3 md:pl-10 w-1/2 pl-8 mb-8 "><h5 class="text-[#666D80] mb-3 font-normal text-sm">Information</h5><a class="block text-sm hover:opacity-[65%] mb-4 " href="/attributes">Data Attributes</a><a class="block text-sm hover:opacity-[65%] mb-4 " rel="noreferrer" target="_blank" href="https://help.clearbit.com/">Support</a></div><div class="lg:w-1/3 md:pl-10 w-1/2 pl-8 mb-8 "><h5 class="text-[#666D80] mb-3 font-normal text-sm">Company</h5><a class="block text-sm hover:opacity-[65%] mb-4 " href="/about">About Us</a><a class="block text-sm hover:opacity-[65%] mb-4 " href="/jobs">Careers</a><a class="block text-sm hover:opacity-[65%] mb-4 " href="/press">Press</a><a class="block text-sm hover:opacity-[65%] mb-4 " href="/customers">Customers</a></div></div><hr class="border-none h-[1px] mb-10 w-full bg-gray-100"/><div class="lg:flex-row lg:justify-between flex flex-col items-center justify-center font-normal" style="flex:1 0 100%"><div class="md:flex md:justify-center md:space-y-0 md:space-x-12 lg:mb-0 lg:order-2 mb-8 space-y-6 text-center"><a class="block text-sm hover:opacity-[65%] " href="/trust">Trust Center</a><a class="block text-sm hover:opacity-[65%] " href="/privacy-policy">Privacy Policy</a><a class="block text-sm hover:opacity-[65%] " rel="noreferrer" target="_blank" href="https://clearbit.statuspage.io/">Status</a><a class="block text-sm hover:opacity-[65%] " href="/support">Support</a><a class="block text-sm hover:opacity-[65%] " href="/legal">Legal</a><a class="block text-sm hover:opacity-[65%] " href="/ccpa-opt-out">Do Not Sell My Info</a><button class="block text-sm hover:opacity-[65%] mx-auto">Manage Cookies</button></div><div class="lg:mb-0 lg:order-3 flex gap-6 mb-12"><a href="https://twitter.com/clearbit" rel="noreferrer" target="_blank"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg"><rect width="24" height="24" rx="6" fill="#F6F8FA"></rect><g clip-path="url(#a)"><path d="M18 8.279a4.915 4.915 0 0 1-1.414.387 2.466 2.466 0 0 0 1.083-1.362 4.932 4.932 0 0 1-1.564.598 2.464 2.464 0 0 0-4.196 2.245 6.99 6.99 0 0 1-5.073-2.572 2.465 2.465 0 0 0 .761 3.286 2.451 2.451 0 0 1-1.115-.308 2.464 2.464 0 0 0 1.975 2.445 2.468 2.468 0 0 1-1.112.043 2.464 2.464 0 0 0 2.3 1.709A4.95 4.95 0 0 1 6 15.77a6.97 6.97 0 0 0 3.774 1.106c4.571 0 7.153-3.86 6.998-7.323A5.012 5.012 0 0 0 18 8.279Z" fill="#131933"></path></g><defs><clipPath id="a"><path fill="#fff" transform="translate(6 6)" d="M0 0h12v12H0z"></path></clipPath></defs></svg></a><a href="https://www.facebook.com/clearbitinc" rel="noreferrer" target="_blank"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg"><rect width="24" height="24" rx="6" fill="#F6F8FA"></rect><path d="M10.5 10H9v2h1.5v6H13v-6h1.821L15 10h-2v-.834c0-.477.096-.666.557-.666H15V6h-1.904c-1.798 0-2.596.792-2.596 2.307V10Z" fill="#131933"></path></svg></a><a href="https://www.linkedin.com/company/clearbit" rel="noreferrer" target="_blank"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg"><rect width="24" height="24" rx="6" fill="#F6F8FA"></rect><path d="M8.49 7.75C8.49 8.44 7.935 9 7.25 9c-.685 0-1.24-.56-1.24-1.25S6.565 6.5 7.25 6.5c.685 0 1.24.56 1.24 1.25ZM8.5 10H6v8h2.5v-8Zm3.991 0h-2.484v8h2.485v-4.2c0-2.335 3.014-2.526 3.014 0V18H18v-5.066c0-3.94-4.461-3.796-5.509-1.856V10Z" fill="#131933"></path></svg></a></div><div class="lg:order-1 flex items-center space-x-6 text-center"><div class="text-sm text-[#666D80]">© <!-- -->2025<!-- --> Clearbit</div></div></div></div></footer></div></div><script id="__NEXT_DATA__" type="application/json">{"props":{"pageProps":{"slug":"trust","directory":"static path","metaInfo":{"metadata":{"tags":[],"concepts":[]},"id":"2pDWUeQQvPb8pacKHuNH5d","type":"shareCard","title":"Clearbit’s Commitment to Trust","description":"At Clearbit, your data always remains your data. We do our best to safeguard it by investing in security and honoring privacy principles as core tenets of our business. Our Trust Center provides helpful information about our legal terms of service, data privacy and compliance practices, security measures and our service performance. We're here to help!","noIndex":true},"isLandingPage":false,"navCtaAnchor":false,"heroSectionBackgroundColorClass":"section-bg-blurred-green-spots-1","heroSectionDarkBackground":false,"heroSectionLabelColor":"bg-indigo-900","heroSectionText":"\u003ch1 className=\"ck-h1-new mb-8\"\u003eClearbit’s Commitment \u003cbr /\u003eto Trust\u003c/h1\u003e\n\u003cp className=\"md:text-lg lg:text-xl\" style=\"margin-bottom:1.5rem !important;\"\u003e\nWe do our best to safeguard it by investing in security and honoring privacy principles as core tenets of our business. Our Trust Center provides helpful information about our legal terms of service, data privacy and compliance practices, security measures and our service performance. We're here to help!\n\u003c/p\u003e","heroSectionCta":{"metadata":{"tags":[],"concepts":[]},"id":"5DBAYvS8hRmZwBb8LpJGC2","type":"primary","name":"Become a partner (mailto)","copy":"Become a partner","url":"mailto:partnerships@clearbit.com?subject=Become%20a%20Clearbit%20Partner","openInNewTab":true},"content":[{"metadata":{"tags":[],"concepts":[]},"id":"2WUOgfk7MsWc4nPCgIEeR9","type":"sectionTextImage","title":"Legal","headline":"Legal","description":"## Legal\n\n\u003cp style=\"marginBottom: 4rem\"\u003e\nThe below are the key legal documents and policies that govern Clearbit’s services:\n\u003c/p\u003e\n\n\u003cFeaturesGrid center=\"true\" textcenter=\"true\" data='[{\"icon\": \"https://images.ctfassets.net/osv85d77hkdf/J96je3wCjc5xo39m9FAec/f39595fa7d3a5a6da8181cb301adcbc0/icon-copy.svg\", \"headline\": \"Website\\nTerms of Use\", \"url\": \"/website-terms\"}, {\"icon\": \"https://images.ctfassets.net/osv85d77hkdf/4PKLNfOMwMTJrS1N5nKDwD/37b76962db44a6a1e06dac2170729474/icon-lock.svg\", \"headline\": \"Customer Terms of Service\", \"url\": \"/legal\"}, {\"icon\": \"https://images.ctfassets.net/osv85d77hkdf/2rqBRZimaCc22t1oIIYMLQ/adc24652375cf2a6ea0a297f068498a0/icon-clearbit-small.svg\", \"headline\": \"Clearbit Logo/Brand Guidelines\", \"url\": \"/press\"}, {\"icon\": \"https://images.ctfassets.net/osv85d77hkdf/4PKLNfOMwMTJrS1N5nKDwD/37b76962db44a6a1e06dac2170729474/icon-lock.svg\", \"headline\": \"DMCA Policy\", \"url\": \"/dmca-policy\"}]' /\u003e\n\n\u003cbr /\u003e\n\u003cbr /\u003e","withImages":false,"textOnlyWidth":true,"squarePicture":true,"backgroundColorClass":"text-center section-bg-navy-ellipse","darkBackground":false,"verticalOrientation":false},{"metadata":{"tags":[],"concepts":[]},"id":"46v5ztKx3ez2Ze7WsRylNs","type":"websiteSection","headline":"Privacy","description":"### Data Governance and Privacy at Clearbit\n\n#### Overview\n\nClearbit is a B2B marketing data engine that helps businesses discover and attract more ideal prospects, personalize their marketing and sales interactions, and enrich and inform their go-to-market systems.\n\nOur Services are designed to help our customers and partners in a wide variety of ways, including by helping them determine which companies might make the best customers, identify the contacts within those organizations by department, role or seniority that might improve or expedite their interactions with those companies, and enabling them to personalize their interactions with those companies.\n\nClearbit processes B2B data for your use within a business context, regardless of where an individual is based, across all of our solutions. This is essentially information that is available on someone’s business card, email signatures or company websites. Clearbit does not collect or process sensitive personal data, such as health records, financial information, or economic status.\n\nOur proprietary indexing systems (\"Clearbit Indexers\") collect information from a variety of sources in order to compile \"Attribute Data\" about corporations, non-profits, and similar entities (\"Companies\") and the professionals that work for them (\"Professionals\"). A complete list of Attribute Data we make available to users of the Site and Services (defined below) can be found at [www.clearbit.com/attributes](https://clearbit.com/attributes).\n\nClearbit acquires the data used in our Services from our customers that use certain enrichment services, public datasets, third-party paid sources and when users use our free tools such as Clearbit Connect.\n\n#### Data Privacy\n\nAt Clearbit, privacy and security are top priorities for us. Clearbit understands the importance of protecting the critical business and personal information entrusted to Clearbit by its customers.\n\nClearbit is a registered data broker in California, and is subject to CCPA (California Consumer Privacy Act) and other applicable US privacy laws. We’re aligned with the General Data Protection Regulation (GDPR) principles. We continue to bolster our already-strong data protection practices by continuously evaluating and updating our company privacy policies and practices.\n\nFor privacy inquiries, please contact [privacy@clearbit.com](mailto:privacy@clearbit.com).\n\n\u003cdiv class=\"flex mt-10 space-x-6\"\u003e\n \u003cimg src=\"https://images.ctfassets.net/osv85d77hkdf/3nROiN89ifejgvTrZS9MAP/82ea7dd6ffb295ba1ede2d8eb35b33b4/ccpa.svg\" alt=\"ccpa logo\" class=\"h-24 w-24\"\u003e\n \u003cimg src=\"https://images.ctfassets.net/osv85d77hkdf/3WzzlTaFBTWrpVH5JIktNu/384f9272da807a3b63a0d06f49a04065/gdpr.svg\" alt=\"gdpr logo\" class=\"h-24 w-24\"\u003e\n \u003cimg src=\"https://images.ctfassets.net/osv85d77hkdf/40g72vp2kpHcizuPP8TyVW/bb32ef744f6b37a7f86e7e03eab26873/21972-312_SOC_NonCPA.png\" alt=\"soc logo\" class=\"h-24 w-24\"\u003e\n\u003c/div\u003e\n\n#### Clearbit and the GDPR\n\nThe [EU's General Data Protection Regulation (GDPR)](http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=uriserv:OJ.L_.2016.119.01.0001.01.ENG\u0026toc=OJ:L:2016:119:TOC) strengthens the rights of EU individuals regarding how their personal data is used \u0026 collected.\n\nClearbit is headquartered in the United States. However, some of our enterprise customers may be based in the EU or engage in other activities that require them to comply with the GDPR.\n\nToday, thousands of organizations rely on Clearbit as the data backbone for their cutting-edge sales \u0026 marketing efforts. We know that our customers take GDPR seriously and need vendors that can help accommodate their GDPR needs. Our legal, operations, and product teams therefore, consistently ensure that we have appropriate product safeguards, policies, and knowledge to facilitate our customers' continued use of Clearbit via our Platform and APIs.\n\nToday, thousands of organizations rely on Clearbit as the data backbone for their cutting-edge sales \u0026 marketing efforts. We know that our customers take GDPR seriously and need vendors that can help accommodate their GDPR needs. Our legal, operations, and product teams therefore, consistently ensure that we have appropriate product safeguards, policies, and knowledge to facilitate our customers' continued use of Clearbit via our Platform and APIs.\n\n##### Legal basis\n\nSome elements of Attribute Data are not collected from data subjects directly; the legal basis for which Clearbit’s processes such data includes the legitimate interest of both Clearbit and its business customers, among other legal bases as applicable depending on the context. Clearbit’s data is processed to provide business intelligence (for sales, marketing, and operations) and help organizations drive revenue by providing users with accurate and up-to-date business information.\n\n##### Legitimate Interest\n\nMany advanced privacy regimes require that personal data must be obtained and processed lawfully and fairly. Personal data should be collected and processed based on a legitimate purpose, after balancing the interests of the organization against the interests and rights of the individual whose data is processed.\n\nThe data collected by Clearbit is limited and does not contain any special categories of personal data or data related to children.\n\nAlthough any personal information about data subjects that we provide our customers access to can be found on business social platforms or during the course of normal business correspondence, we do not collect data directly from the data subjects. As a result, they may not know that their data is in our database. They can always exercise their rights in relation to their data through our [Privacy Request Form](https://preferences.clearbit.com/privacy).\n\nFinally, Clearbit follows data minimization principles and only collects data that are strictly necessary to achieve its purposes. Clearbit has processes in place to limit the data processed to business contact information which is professional in nature. Through our [Privacy Request Form](https://preferences.clearbit.com/privacy), individuals can claim control over their data.\n\n#### Data subject rights\n\nClearbit operates in accordance with fundamental privacy principles that underlie global privacy regulations, with respect to an individual’s right to know what personal data is collected and how it is used or otherwise processed. Clearbit has features that support customers' ability to handle data subject requests, such as requests for access, correction, or erasure, by allowing individuals to access and modify applicable personal information via our [Privacy Request Form](https://preferences.clearbit.com/privacy).\n\n#### Data deletion and retention\n\nClearbit periodically verifies the accuracy of all of the information in its databases. Data that is found to be inaccurate or out of date is removed from the database. In addition, we honor all opt-out requests so if any person requests deletion of their data, then such data would be deleted.\n\nWhen a customer terminates their contract with us, upon request, we delete their account and remove any associations of such customer with any data in our databases promptly, and no later than 90 days of termination of their contract.\n\n#### Data access\n\nClearbit enforces the “rule of least privilege” and has documented segregation of duties. We also enforce formal logical and account separation of the development, QA and production environments.\n\n#### Data residency\n\nCurrently, Clearbit stores all its data in servers of US-based cloud companies. The GDPR doesn’t require personal data of EU citizens and residents to be only stored within the EU.\n\n#### Subprocessors\n\nWe maintain a list of the [subprocessors](https://clearbit.com/subprocessors) that we use as part of our products and services, including the activities and services performed by such subprocessors and their country location.\n\n#### Privacy notices\n\nOur privacy policy is available at [https://clearbit.com/privacy](https://clearbit.com/privacy).\n\nWe operate in accordance with internal privacy and data protection policies that are based on privacy principles that underlie international privacy regimes, including the GDPR and the California Consumer Privacy Act (CCPA). We actively monitor and intend to comply with any new applicable privacy laws.\n\n#### Training and awareness\n\nWe require annual privacy and security training that’s mandatory for all Clearbit personnel. These trainings are actively tracked and regularly reviewed to help ensure compliance and relevance for our business activities. We also deliver periodic privacy and security communications to supplement required trainings, further reinforcing data privacy and data security best practices.\n\n#### Governance and accountability\n\nClearbit’s privacy program is directed and overseen by the DPO , and a team of dedicated professionals. IAPP-certified privacy professionals review company activity with privacy and data protection implications, assess compliance and make recommendations to help meet compliance requirements.\n\n#### Privacy by design\n\nOur product and engineering teams work closely with our global privacy team to embed privacy principles in our products and services and help ensure privacy compliance with respect to the various phases of product development, starting at concept, through requirements gathering, to implementation and release. Beyond product development activities, our privacy team drives our privacy by design approach on a corporate-wide basis, including assessing a variety of activities across the company involving personal data for privacy compliance.","firstShowImage":false,"verticalOrientation":false,"negativeImageMargin":0,"cardWrap":false},{"metadata":{"tags":[],"concepts":[]},"id":"4OFSuUPNE1aJ9IIMMt1wrG","type":"websiteSection","headline":"Compliance","description":"### Compliance\n\nPeople, process and technology are all considerations in how we approach information security and data privacy. To validate the effectiveness of our internal security controls, we engaged an independent auditor to assess our compliance with a framework which is specifically designed for software-as-a-service (SaaS) providers. Our security program is evaluated using AICPA’s SOC 2 Trust Services Criteria aligned with the controls contained in the COSO 2013 framework.\n\nClearbit is SOC 2 Type 2 Compliant","svg":{"metadata":{"tags":[],"concepts":[]},"id":"1ZQet7lV4muBwgW2snIAm6","title":"AICPA SOC","description":"","file":{"url":"//images.ctfassets.net/osv85d77hkdf/1ZQet7lV4muBwgW2snIAm6/9e29b8816cdccc2abb32803cac69d68d/aicpa_soc.jpg","details":{"size":20296,"image":{"width":444,"height":468}},"fileName":"aicpa_soc.jpg","contentType":"image/jpeg"}},"firstShowImage":false,"verticalOrientation":false,"negativeImageMargin":0,"cardWrap":false},{"metadata":{"tags":[],"concepts":[]},"id":"75QZ6eFvj2n3i19JSgKFIB","type":"websiteSection","headline":"Security","description":"### Security\n\nClearbit has implemented a security strategy that is largely influenced by emerging trends in the cybersecurity field and common threats that impact businesses in the technology sector. We maintain a security team which provides executive-level oversight and approval for security and compliance policy initiatives.\n\n#### Personnel Security\n\nWe perform comprehensive background screenings on all new employees. All employees are required to sign non-disclosure agreements at the time of hire. Completion of our awareness and training program is required for all new hires as part of their onboarding plan. Ongoing refresher training activities are carried out throughout the year and participation is tracked. \n\n#### Cloud and Network Architecture\n\nClearbit utilizes Amazon Web Services and Google Cloud Platform data centers located in the United States.\n\nThe AWS and GCP cloud infrastructure has been designed and managed in compliance with regulations, standards, and best practices, including SOC 2, ISO 27001, FedRAMP, GDPR, CCPA, and PCI DSS Level 1. Please visit here to learn more about the security standards and frameworks that our cloud data centers comply with: [https://aws.amazon.com/compliance/programs/](https://aws.amazon.com/compliance/programs/) [https://cloud.google.com/security/compliance](https://cloud.google.com/security/compliance)\n\nThe application is architected, at a minimum, with N+1 redundancy for network and power failover protection. All servers, firewalls, switches, load balancers, and routers are fully redundant. In the event of component failure, a redundant counterpart is available to handle the load, so our systems remain available.\n\n#### Securing Clearbit Applications\n\nWe engage third-party security experts to perform penetration tests on an annual basis and vulnerability scanning is performed on a regular basis. Clearbit adheres to a Software Development Lifecycle Policy. Code is evaluated for design, functionality, and common security exposures. Changes to the source code are governed by standardized change management processes. In addition to automated and manual testing, our code is peer reviewed prior to being deployed to production.\n\nClearbit’s APIs are designed to deliver a highly available, scalable solution for customers, while maintaining core security protections. \n\nClearbit imposes a number of rate limiting controls to automatically block malicious traffic and protect accounts from abuse.\n\n#### Protecting Customer Data\n\nClearbit supports TLS v1.2 and TLS v1.3 encryption to protect communications. Data is encrypted at rest using AES-256 bit encryption while in storage. \n\nClearbit limits the number of personnel with access to information systems containing sensitive data. Access to customer data is provisioned only where a requirement to fulfill job duties exists (e.g. respond to a customer support case, resolve a technical issue requiring engineering input). \n\n#### Physical and Environmental Protection\n\nPhysical access controls are implemented and include electronic access doors, video surveillance, security guards, visitor access controls, and security zones.\n\nData center equipment is protected from environmental threats using automatic fire detection and suppression equipment, climate control which prevents overheating and reduces the possibility of service outages, water leakage detection and removal and uninterruptible Power Supply (UPS) units to provide back-up power in the event of an electrical failure.\n\n#### Monitoring\n\nWe have implemented application health monitoring alerts to aid in detecting operational incidents early.\nIncident response procedures are defined, documented, and approved by management.\n\n#### Business Continuity \u0026 Disaster Recovery\n\nCustomer data is backed up using automated policy-based scheduling and protected using AES-256 bit encryption. Clearbit has a disaster recovery plan that outlines roles and responsibilities for key personnel involved in business continuity, our plan to activate and respond to a disaster, target timelines and testing requirements.\n\n#### Supplier Security\n\nOur goal is to ensure our suppliers can uphold the same level of commitment to customers that we promise. We have established a Vendor Risk Management program that is used to evaluate new sub processors and monitor existing sub processors on an annual basis. Selection and renewal of sub processors require approval from multiple stakeholders to manage risk.\n\n#### Incident Reporting\n\nIf you have any questions about Clearbit’s security program or you need to escalate a security concern, please contact us at security@clearbit.com or by phone to (888) 237-8136. We have a team responsible for security incident response that can assist.","firstShowImage":false,"verticalOrientation":false,"negativeImageMargin":0,"cardWrap":false},{"metadata":{"tags":[],"concepts":[]},"id":"76qNX0UJhxjOmuTctL1QVI","type":"websiteSection","headline":"Status","description":"### Status\n\nYou can subscribe to real-time notifications about operational incidents and access status information about performance by visiting our status page at [https://status.clearbit.com/uptime](https://status.clearbit.com/uptime).","firstShowImage":false,"verticalOrientation":false,"negativeImageMargin":0,"cardWrap":false}],"anchors":[{"copy":"Legal","url":"#legal"},{"copy":"Privacy","url":"#data-governance-and-privacy-at-clearbit"},{"copy":"Compliance","url":"#compliance"},{"copy":"Security","url":"#security"},{"copy":"Status","url":"#status"}]},"__N_SSG":true},"page":"/trust","query":{},"buildId":"iJMlTHsUA9mH17w2H2ORb","isFallback":false,"gsp":true,"scriptLoader":[]}</script></body></html>

Pages: 1 2 3 4 5 6 7 8 9 10