How does Lusha keep your data safe?
At Lusha, we prioritize data security and we’re committed to protecting your data at all times.
Below is a high-level summary of how Lusha protects your personal data (“Your Data”). For further information, please refer to our Privacy Policy.
Security Framework
Lusha has an extensive privacy and security framework (“Security Framework”) to ensure there is the appropriate management of cyber attacks and data risks. It includes the implementation of people management, physical product security, as well as asset and access management, cloud and network infrastructure security, third-party security, vulnerability management, security monitoring, incident response, and policies and procedures. Lusha follows accepted industry standards to protect the information submitted to us, both during transmission and once received. Lusha encrypts data while in motion consistent with industry standards at a minimum of 256-bit encryption.
How does Lusha comply with the law?
Lusha is a registered data broker in California under the CCPA (California Consumer Privacy Act) and is responsible for the security of all data it collects. Lusha has a robust technological infrastructure that it tests regularly, to ensure its processing activities are aligned with the security demands of our clients and with the best standards in the world.
If you are a business user of Lusha located outside of the United States, please note that Lusha may collect, process, and store your End Users’ Data in the US and other countries. As a company that advocates transparency, Lusha publishes its list of suppliers and ensures that the safety mechanism it uses to protect personal information is passed on to them.
Technology
Lusha ensures that its security infrastructure is consistent with leading industry standards for virus protection, firewalls and intrusion prevention technologies to prevent any unauthorized access or compromise of Lusha’s network, systems, servers, and applications from unauthorized access.
Lusha implements and maintains various policies and procedures for managing changes to production systems, applications and databases, including without limitation, processes for documenting testing and approval of changes into production, security patching, and authentication.
Lusha implements and maintains a risk assessment program to continuously help identify foreseeable internal and external risks to its information resources and determine if existing controls, policies, and procedures are adequate or need to be updated.
Certifications
Lusha is committed to mitigating risks and maintaining industry-level best practice security and compliance measures and is audited annually.
Lusha maintains an ISO 27001 certification, which ensures that it maintains a superior level of data protection, and demonstrates that Lusha meets the required measures for organization security, management, information security, and personal information cloud security and privacy.