Protecting Your Data

Security & Privacy at Rebuy

Learn how we protect user privacy and secure sensitive data

Trusted by brands around the world:
Security Principles

Our policies are based on the following foundational principles:

  • Confidentiality

    Ensure that sensitive information is only accessible to authorized individuals or systems.

  • Integrity

    Safeguard the accuracy and consistency of data over its lifecycle.

  • Availability

    Ensure that systems and data are accessible when needed.

  • Authorization

    Grant appropriate access levels to authenticated users based on their role or privileges, ensuring they can only perform authorized actions.

Data Protection

  • 🤝

    Rebuy partners with Vanta to ensure our compliance with GDPR and U.S. Data Privacy regulations are consistent with the changing landscape.
  • 🌎

    Rebuy maintains an automated Data Subject Access Requests workflow to make consumer privacy easier and more consistent for merchants.
  • 🔐

    Rebuy personnel undergo annual training on data privacy rights and how to handle data in regards to GDPR and CCPA.

Product Security

  • 🕵️

    Annual penetration testing with a trusted vendor and advisor
  • 🧪

    Dynamic Application Security Testing via Tenable ONE
  • ⛅️

    Cloud Security analysis in both Google Cloud Platform and Tenable ONE
for security researchers

Vulnerability disclosure policy

View our VDP for information about reporting security vulnerabilities.

Organizational Security

We're serious about protecting customer & employee data

  • Mobile device management

    Automatically applies pre-designated profiles on our employee workstations while maintaining a consistent patch schedule across our application base.

  • Google SSO & 1password

    Google SSO and 1password are enforced across the organization to elevate our security posture across applications and employees.

  • Annual security awareness

    Annual security awareness training is conducted to keep employees well informed and versed in active security landscape.

Data Privacy

Data privacy highlights

Automated Data Subject Access Requests workflows ensures consistent and timely results