
SupportLogic Data Integration Guide
The process of integrating your data is designed to be secure, granular, non-intrusive, and flexible.
SupportLogic SX™ is designed Security First to ensure the sustained protection of your data. From end to end, our processes and systems are employed to keep your data secure and maintain a track record of zero breaches or loss of data. Machine learning (ML) and natural language processing (NLP) require large amounts of data to make accurate and actionable predictions, and a secure architecture is critical to ensuring that this technology can deliver as promised.
SOC 2 Type II & ISO 27001
SupportLogic is SOC 2 Type II and ISO 27001 compliant. The Service Organization Control (SOC) report certifies compliance with the Trust Services Principles outlined by the AICPA and ensures that all policies and procedures meet the industry standard for security.
We regularly conduct both internal and external audits and penetration tests, with complete results available by request. We invite you to run your own security tests on the VPC.
Contact your SupportLogic Sales Representative for the latest annual audit report.
GDPR
SupportLogic is GDPR compliant and committed to the protection of your personal data.
The CRMs we process meet the GDPR, ISO 27001, and CCPA
compliance and certification requirements. Your data is then processed in a single-tenant VPC that also meets these requirements.
Refer to our Privacy Policy for full details on the handling of your personal data.
HIPAA
SupportLogic is committed to a platform that can be trusted by you and your patients. Our data privacy and security protocols conform to the HIPAA Security, Privacy, and Breach Notification Rules and are designed to meet your HIPAA compliance requirements.
Security can never be technology alone. All SupportLogic employees and contractors are trained using comprehensive security awareness programs. All employees and contractors are also required to pass background checks going back 7 years with a full criminal history check, education verification, employment history verification, and reference check. Access to your data is further restricted to a small group of allow-listed employees.
Security training programs strictly define the protocols around SupportLogic workstations, interactions with your data, enforcement, auditing, and reporting. We also perform regular phishing simulations as part of security awareness. SupportLogic employees undergo additional security training based around role-specific requirements. These policies and a Security First mindset form the foundation for maintaining SOC 2 compliance.
The management and monitoring of physical access to facilities is an important part of SupportLogic security. Electronic control systems manage access to controlled spaces, and rights are strictly based on an employee’s role. Employee access cards and/or keys are never shared or loaned to others, and access cards/keys are free from identifying information other than a return mail address.
On-site physical access to sensitive or confidential information is controlled through a combination of the following mechanisms:
Your SupportLogic SX deployment resides entirely in an isolated virtual private cloud (VPC) instance. The VPC ensures a high level of security and protects your data through the use of perimeter control, ingress and egress rules, and context-aware access based on client attributes. SupportLogic also supports the ability to host on a dedicated private cloud.
For the standard VPC deployment, data center access is maintained at the highest standards of security.
Access
Access to your data is strictly limited to SupportLogic employees that require access to perform role-specific duties. No data is shared, nor any documents or data derived from your data, with anyone except the SupportLogic employees specifically assigned to your projects.
Employees can only store your data in approved locations, and cannot use your data for anything except troubleshooting or approved projects. Employees are strictly prohibited from copying or storing any data that contains legally sensitive or personally identifiable information, including medical or financial data.
Data is securely deleted when your contract expires or is canceled. Any screenshots or other similar data is edited to redact/black-out any identifying information before storing in other systems.
In case of off-boarding, SupportLogic stores only metadata and/or minimal, anonymized data as directly relevant to making ML predictions. In these cases, we do not store complete copies of your CRM data for ML purposes. Upon request, data can be deleted within 3 business days.
Usage
The data used by SupportLogic to train ML models is primarily composed of metadata and/or data created within the SupportLogic data platform. Metadata created within the SupportLogic data platform includes anonymized product usage and telemetry data. We do not use native CRM data to train machine learning models across environments.
This created data is used to improve the product for end users (for example, improving pages that are most frequently used based on usage data; speeding up the slowest API requests based on telemetry data) and also for ML purposes. This data is not shared with third parties except in the case of highly aggregated data shared with limited audiences (namely, for example, the number of unique users that log into all SupportLogic instances on a month-by-month basis).
Data is only created within the SupportLogic data platform as a result of direct user action by SupportLogic users. Examples include additional support case comments (which may optionally be written back to the CRM) or actions taken through the SupportLogic UI that result in changes that are written back to the system of record.
Regarding ML modeling, metadata and anonymized data used to train ML models outside of your specific data environment from which they originate consists of user-originated feedback about the accuracy and/or validity of ML model predictions and derived input and output data of the ML model used for prediction.
SupportLogic SX consists of three elements: a lightweight data connector (ELT), a cloud platform, and a web UI. The data connector extracts from your CRM source using the authentication token provided by you. All data collection happens securely over SSL using REST APIs and all three elements are hosted in the secure VPC.
The ELT stage forces all access through a limited authentication token. SupportLogic employee access to your data is controlled through self-service OAuth via the VPC. This way, your user permissions are preserved and access is controlled both internally and externally. Complete control over data permission always resides with you, as no credentials are ever shared. Access to your data is enabled or disabled from a single, secure access point.
The recommended API write back is secured according to your CRM system’s capabilities. Salesforce Service Cloud uses OAuth, Zendesk uses token-based APIs, and Microsoft Dynamics uses a Client ID/Client secret token exchange.
For additional information on the data pipeline, see the Data Integration Guide.
ETL At a Glance
A stringent SDLC policy ensures that the development team understands the importance of security and is well-versed in standard software development practices. While all data is hosted in the public cloud infrastructure, the SDLC is used to:
Core SDLC Elements
All data in the VPC is encrypted both At Rest and In Transit using HTTPS (TLS 1.2) and 2048-bit RSA SSL certificates signed with SHA256.
In transit, your data is encrypted before transmission. The system endpoints are then authenticated and the data is decrypted and verified on arrival. This protocol protects data in the event communications are intercepted while data moves between two systems.
At rest, your data is encrypted to protect from a system compromise or data ex-filtration.
Each VPC instance handles the encryption protocols and is fully FIPS 140-2 compliant. KMS is used to manage encryption keys for cryptographic functions and bulk data encryption. Specifically, the service encrypts third-party tokens that grant employee access to your data. This service enables a provable and monitorable root of trust (RoT) over all data in the system.
Penetration tests are used periodically to proactively address security gaps. These tests are the backbone of the information security audit. Both the SOC 2 audit and annual penetration test are renewed on an annual basis.
Audit vendors run two types of penetration tests: Network and Web Application. Each test has three risk ratings (Low, Medium, and High) with a risk score from 0 (lowest) to 40 (highest). The lower the risk score the better. The most recent tests received a risk score of 0 (the lowest possible) for the Network Penetration Test and a score of 1 for the Web App Penetration Test.
SupportLogic uses a combination of custom developed and commercial applications. These run on enterprise-grade server platforms supported by commercial databases. Redundancy is maintained for all components of the infrastructure, including firewalls and servers. This setup was developed to quickly enable the addition of bandwidth and server capacity to support your requirements. External services and internal applications constantly monitor communications, job logs, system performance, and security.
Data is collected from a variety of sources. This information is combined to help tailor communications and to develop and improve solutions. Refer to the Information Classification Policy for full policy details.
All information—including machines, data, code, documents, and intellectual property—are treated and managed as valuable resources. The compliance and
effectiveness of the following information security policies are measured using periodic reporting.
Access
Credentials
Storage
Management
Process is at the core of SupportLogic security. A continuous monitoring program is used to ensure the security compliance of the systems processing your data. The SupportLogic Continuous Monitoring Program is comprised of the following elements:
Risk Assessment
Risk assessment is regularly performed as part of an overall risk management process. The goal is to uncover any vulnerabilities, both technical and non-technical, and develop practical strategies to minimize these risks. These assessments are conducted through an internal review process in conjunction with clearly defined objectives. To ensure it becomes part of the fabric of a risk management program, these assessments are performed annually and reviewed for modifications.
Service Resiliency
All internal business data (including, code, bug/feature databases, documentation, and configurations) is hosted online through cloud-based service providers. The data hosted on cloud-based service providers is protected against outages through best practices. Our technical operations team is responsible for updating the SupportLogic application, applying OS updates, performing backups, and performing restores in the event of an outage. Technical operations maintain a 24-hour recovery point objective (RPO) and 30-minute recovery time objective (RTO) for production systems.
SupportLogic uses best-of-breed third-party vendors. Vendor SOC reports and business recovery plans are regularly reviewed to ensure these tools meet all requirements.
Is my data secure during extraction?
Yes – All data is encrypted in transit using TLS 1.2 (and above).
Is my data secure in your platform?
Yes – At rest, your data is encrypted under the 256-bit Advanced Encryption Standard, and each encryption key is itself encrypted with a regularly rotated set of master keys.
Is the data integration secure?
Yes – Only you can give access to your data by inviting new users to your account or by engaging a third party and explicitly providing access to your data. This access is used to run analytics against your data, with the option to write back to your CRM using SupportLogic SX as a bidirectional solution. Via the ETL, you have the ability to grant or revoke visibility permissions and can remove access permission at any time.
Can I use SSO or Active Directory?
Yes – You can use many industry-standard SSO and Active Directory providers.
What data is collected?
The following data types are collected from your CRM system:
Can I delete my data from SupportLogic?
Yes – When your account is terminated, SupportLogic will mark all your data for eventual deletion. However, by request your data can be deleted within 3 business days. Send a request to hello@supportlogic.io with the details of the support case. SupportLogic will delete the case data and send you a confirmation email within one business day.
Is data stored by SupportLogic?
Your data is only stored in your VPC instance.
SupportLogic only uses your data for generating the ML models tuned to your organization. Your data is not used to train any other models. Once the models are created the collected data is not needed, SupportLogic may store data to continuously improve your models. SupportLogic can purge any data by request.
Does SupportLogic store sensitive information like usernames and passwords?
SupportLogic does not require login details or a password to your CRM system. However to use the SupportLogic application we require that you to create an account on our platform.
There are two options for account creation: you can create individual user accounts using your email address or sign in with your existing Slack credentials. If you sign in with Slack we collect your profile information.
Want the latest B2B Support, AI and ML blogs delivered straight to your inbox?