Fentik Security Practices

Fentik takes security as a top priority. This documents describes the current state of security and the practices followed by Fentik. This information can change rapidly, as we are constantly improving our security and as we continue to build our product.

Fentik provides a real-time data platform that enables application developers to build customer facing data applications. Our services are accessed through our web interface at https://app.rubicon.io.



Security Policies


Secure Handling of Data - All customer data at rest is encrypted with using AES-256-GCM. The data in flight is encrypted via TLS 1.2. The Fentik platform only supports access via HTTPS and never sends any unencrypted data outside of our internal infrastructure.


Access Controls - Access to customer data within our environment is strictly controlled and only used to provide support. We employ the principle of least privilege so the employee accounts do not have permission to perform privileged operations, and to gain elevated privileges users are required to use two-factor authentication. Employees go through mandatory security training to ensure they are aware of our policies and follow them.


Monitoring - We leverage intrusion detection systems to detect and alert our security team about any suspicious activities. We also do periodic vulnerability scanning of our production environment to find and patch any detected vulnerabilities.












Effective date: 1st March, 2022


At Fentik, we take your privacy seriously. Please read this Privacy Policy to learn how we treat your personal data. By using or accessing our Services in any manner, you acknowledge that you accept the practices and policies outlined below, and you hereby consent that we will collect, use and share your information as described in this Privacy Policy.


Remember that your use of Fentik's Services is at all times subject to our Terms & Conditions, which incorporates this Privacy Policy. Any terms we use in this Policy without defining them have the definitions given to them in the Terms & Conditions.



Privacy Policy Table of Contents

What this Privacy Policy Covers

Personal Data

− Categories of Personal Data We Collect

− Categories of Sources of Personal Data

− Our Commercial or Business Purposes for Collecting Personal Data

How We Share Your Personal Data

Tracking Tools and Opt-Out

Data Security and Retention

Personal Data of Children

Other State Law Privacy Rights

Changes to this Privacy Policy

Contact Information



What this Privacy Policy Covers

This Privacy Policy covers how we treat Personal Data that we gather when you access or use our Services. “Personal Data” means any information that identifies or relates to a particular individual and also includes information referred to as “personally identifiable information” or “personal information” under applicable data privacy laws, rules or regulations. This Privacy Policy does not cover the practices of companies we don’t own or control or people we don’t manage.



Personal Data

Categories of Personal Data We Collect

This chart details the categories of Personal Data that we collect and have collected over the past 12 months:


Effective date: 1st March, 2022


At Fentik, we take your privacy seriously. Please read this Privacy Policy to learn how we treat your personal data. By using or accessing our Services in any manner, you acknowledge that you accept the practices and policies outlined below, and you hereby consent that we will collect, use and share your information as described in this Privacy Policy.


Remember that your use of Fentik's Services is at all times subject to our Terms & Conditions, which incorporates this Privacy Policy. Any terms we use in this Policy without defining them have the definitions given to them in the Terms & Conditions.



Privacy Policy Table of Contents

What this Privacy Policy Covers

Personal Data

− Categories of Personal Data We Collect

− Categories of Sources of Personal Data

− Our Commercial or Business Purposes for Collecting Personal Data

How We Share Your Personal Data

Tracking Tools and Opt-Out

Data Security and Retention

Personal Data of Children

Other State Law Privacy Rights

Changes to this Privacy Policy

Contact Information



What this Privacy Policy Covers

This Privacy Policy covers how we treat Personal Data that we gather when you access or use our Services. “Personal Data” means any information that identifies or relates to a particular individual and also includes information referred to as “personally identifiable information” or “personal information” under applicable data privacy laws, rules or regulations. This Privacy Policy does not cover the practices of companies we don’t own or control or people we don’t manage.



Personal Data

Categories of Personal Data We Collect

This chart details the categories of Personal Data that we collect and have collected over the past 12 months: