Remove us security
article thumbnail

How we ensure the highest standards of data privacy and compliance within Intercom

Intercom, Inc.

We protect it throughout its lifecycle with robust security practices, tailored role-specific staff training, and rigorous compliance with regulations. We handle the security of your data so that you can focus on acquiring, engaging, and retaining your customers. TL;DR: We do regional hosting in AU, EU, and US. Data access.

article thumbnail

Health matters: Store and process healthcare data in a HIPAA-compliant manner using Intercom

Intercom, Inc.

At Intercom, the security and protection of our customers’ data is of the utmost importance. The Health Insurance Portability and Accountability Act (HIPAA) is a US statute that was introduced in 1996 to implement industry-wide standards for the safeguarding of PHI and ePHI. What is HIPAA?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

EACH NUMBER COUNTS

Futurelab

But wait a second–what were these numbers really telling us? Long-term B2B contracts are not easy to secure and almost impossible to rescue when gone. Those were the real news.

VOC 144
article thumbnail

Drata’s CEO Adam Markowitz on creating a culture of cyber security

Intercom, Inc.

There are enough stories of data breaches and cyber attacks to chill even the savviest security engineer to the core. Cyber security and compliance, it turns out, is in demand. But before universities would do business with them, they needed assurance on their security posture. Less than a year later, Drata was launched.

article thumbnail

How our infrastructure scales alongside our customers

Intercom, Inc.

Intercom has been growing, and will only continue to do so – many of our longest standing customers have evolved with us over the years. That means being able to accommodate huge workloads in a reliable and performant manner, and continuously expanding them as our customers grow with us. At Intercom, we aim to run less software.

article thumbnail

Call Center Security: A Guide to Keeping Your Data Safe

Fonolo

The great migration of contact centers transitioning from on-site to hybrid work environments isn’t slowing down–and an air-tight call center security strategy has never mattered more. Keeping your company’s data secure is essential, but it can seem like an overwhelming task. Why a Data Security Strategy is Essential.

article thumbnail

Announcing Intercom for Enterprise: A whitepaper exploring how we enable large companies to support their customers

Intercom, Inc.

In five chapters, you’ll learn all about: Intercom’s rigorous security measures. Our holistic approach to availability has allowed us to significantly exceed our target uptime of 99.8% Here are some of the top takeaways: Our holistic approach to availability has allowed us to significantly exceed our target uptime of 99.8%