Enterprise-level security & privacy
At Nektar, data privacy and security are the pillars of our platform. From the beginning, we've designed our application to ensure the confidentiality, integrity, and availability of your business information. Our multi-layered security approach is built on the principles of data minimization and client control. We collect only the minimum data needed and empower you to manage access to your CRM fields and email inboxes.
Our security program is SOC 2 Type II compliant and aligned with ISO 27001 standards, incorporating administrative, physical, and technical safeguards to protect your data. We continuously monitor and enhance our systems to keep pace with the evolving security landscape.
Privacy Philosophy: We prioritize data minimization and transparency. You have full control over your data, deciding what to share through secure API access, with the flexibility to disable access at any time.
Security Philosophy: Our approach ensures - Confidentiality: Protection against unauthorized access; Integrity: Safeguarding the accuracy and trustworthiness of your data; Availability: Ensuring data is accessible when needed. At Nektar, we are committed to delivering confidence and control over your most sensitive information.
Founded in 2020
Here are the important security policies and documents which are a part of Nektar’s compliance program.
Confidentiality Policy
Policy
Acceptable Usage Policy
Policy
Vendor Management Policy
Policy
Physical Security Policy
Policy
Data Retention Policy
Policy
Endpoint Security Policy
Policy
Business Continuity Policy
Policy
Access Control Policy
Policy
Data Backup Policy
Policy
Password Policy
Policy
Incident Management Policy
Policy
Change Management Policy
Policy
Risk Management Policy
Policy
Vulnerability Management Policy
Policy
Data Classification Policy
Policy
Code of Business Conduct Policy
Policy
Encryption Policy
Policy
Information Security Policy
Policy
Media Disposal Policy
Policy
Disaster Recovery Policy
Policy
HR Security Policy
Policy
System Description
Policy
Pentest Report
Document
Network Diagram
Document
Privacy Controls
Document
Master Services Agreement
Document
Data Processing Agreement
Document
Privacy Policy
Document
Term Of Service
Document