Privacy FAQ 2017-09-28T17:34:54+00:00

Privacy FAQ

We do everything in our power to protect you and your businesses from attempts to compromise your data. We vigorously resist any unlawful attempt to access our customers’ data. Jopari used an independent auditor that has verified that our privacy practices and contractual commitments comply with state and federal Privacy regulations.

  • The data you have sent for business processing belongs to you.
  • We do not use your information for anything but the purposes specified in your agreement
  • You have control over your data. We provide you with tools to delete and export your data so that you can take your data with you at any time or stop using our services altogether.
  • We are transparent about where your data is stored.
You can take your data with you if you choose or stop using our services.
Jopari may only access data in your account in strict compliance with our Privacy Policy and your Customer Agreement. We also further describe in your Business Association Agreement and Service Level Agreement the use of our commitment to protecting your data. For purposes of providing technical support, an administrator from your domain may choose to grant the Jopari Support team permission to access accounts in order to resolve a specified issue, if applicable.
Jopari’s security practices are verified and certified by third-party auditors. An independent auditor has certified and examined the controls present in our data centers, infrastructure, and operation. Jopari employment practices require employees are subject to background investigations based on their level of access. Any employee access is governed by a policy of “least privilege access,” which means that access is only granted to the information and resources that are necessary for the execution of the assigned task.
Jopari’s applications are certified for SOC 2 Type 11, by the American Institute of Certified Public Accountants (AICPA). This means that an independent auditor has examined the controls protecting the data in our systems (including logical security, privacy, and data center security), and assured that these controls are in place and operating effectively.