Data Security
Last modified June 27, 2025
Data Security Overview
Insightful Pipe takes data security very seriously. Our business depends on protecting your data, so we've adopted a "privacy by design" approach and follow industry best practices across encryption, access control, and software architecture.
We also adhere to international data-protection regulations, including the EU General Data Protection Regulation (GDPR). Please see our Privacy Policy for more details on privacy compliance.
End-to-End Encryption
TLS encryption for data in transit and AES encryption for data at rest
Access Control
Multi-factor authentication and principle of least privilege
Cloud Infrastructure
Hosted on Google Cloud with enterprise-grade security controls
Continuous Monitoring
Real-time system monitoring and anomaly detection
Regular Audits
Independent penetration tests and vulnerability assessments
Services Overview
Insightful Pipe provides a unified platform for advertisers to collect, consolidate, and analyze their advertising data from networks such as Facebook, Google Ads, LinkedIn, Twitter, and Bing. With your permission, we connect to each platform's API, retrieve your campaign metrics, and store optimized, report-ready summaries for fast queries and long-term retention.
Data Ownership
All data we collect and process on your behalf remains your property. We will permanently delete your data upon your request or when your account is terminated.
Data Collection, Transfer & Storage
- In Transit: All data transfers between your systems, third-party ad platforms, and Insightful Pipe are encrypted using TLS.
- At Rest: We encrypt your data at rest using industry-standard AES encryption.
- Network Isolation: Data does not leave our private VPN except when securely delivered to you.
Technology Platform
Cloud Infrastructure
We host our services on Google Cloud, leveraging its security controls and compliance certifications.
Access Management
We enforce strict Identity and Access Management (IAM) policies, multi-factor authentication (OTP/TOTP), and the principle of least privilege to guard against unauthorized access.
Standards & Audits
Our security program aligns with ISO 27001 best practices. We conduct regular independent penetration tests and vulnerability scans.
Change Management
Every update undergoes automated testing, peer code reviews, and timely security patching before deployment.
Monitoring & Alerting
We continuously analyze system logs and metrics to detect and respond to anomalous activity in real time.
Data Removal Process
You have full control over your data and can remove it from our infrastructure at any time. Follow these simple steps:
Steps to Remove Your Data:
- Navigate to the Connectors page in your Insightful Pipe dashboard
- Scroll down to the "Connections" section
- Click "Delete" on each connection you want to remove
- Confirm the deletion when prompted
- Visual Reference: Here's what the interface looks like when you're ready to delete connections:
In the "Active Connections" table, you'll see all your connected accounts with a delete button (trash icon) in the Actions column.
⏱️ Data Deletion Timeline: Once you delete your connections, all associated data will be permanently removed from our infrastructure within 36 hours.
Security Inquiries & Special Requests
If you have any security-related questions, concerns, or special requests regarding your data, please don't hesitate to contact our development team.
We typically respond to security inquiries within 24 hours.