Security and privacy are critical and non-negotiable values of our service.
On this page we address common questions potential customers have asked us about our approach to security.
If, after reading this document, you still have questions please get in touch.
As a Europen (German) company we are bound by GDPR, please find all the details of our approach to privacy and data protection on our GDPR page.
Context / General background
Our service exists to make open data easily usable.
The reality is we have very little worth "stealing", in that we aggregate and simplify the use of data that is freely available across the internet.
Nevertheless, we take the security of all systems and our users, especially their privacy, very seriously.
We hold no payment information, and always collect as little data as possible.
At sign up or when changing passwords, we show users their password strength. We encourage all users of our services to only use secure passwords (ideally via a password manager).
Whether a paying customer or a free-trial account, users can secure their account with two-factor authentication. We encourage use of this feature.
The OpenCage account dashboard is only accessible via HTTPS.
Users can replace their geocoding API key(s) at any time in their account dashboard.
Users can delete their account at any time, and inactive accounts are automatically deleted after six months.
No user data is ever sold or shared with third parties.
All logs are deleted after six months.
We NEVER hold any customer payment credentials (card numbers, etc).
Payment/Billing is handled via our payment processor, Stripe. All details of Stripe's security practices and PCI compliance can be found on the Stripe security page.
Development process and awareness of vulnerabilities
- All 3rd-party dependencies are regularly and automaticaly scanned for known and new vulnerabilites. Patches are applied promptly.
- All software undergoes automated testing in a staging environment and follows a formal launch process before going live.
- No user data or production credentials are stored in source code.
- All servers are secured and accessible only via secure methods.
- Security of all systems is regularly reviewed and extended.
- Employees and contractors are given the lowest level of access that allows them to get their work done.
- All employees and contractors sign an NDA before gaining access to any sensitive information.
- All team members are aware that security is of paramount importance, and time is budgeted for learning, reviewing, and implementing security best practices.
ISO 27001 and other certifications
As a small business giving away open data, we do not believe the burden of ISO 27001 certification would be appropriately proportionate.
Our API and geosearch services are hosted at multiple redundant locations with in the EU with the well known hosting company Hetzner, which is ISO 27001 certified. Please see the full details on the Hetzner site.
Our team does not have physical access to any of our servers.
Security Bounty Program
We welcome and reward outside help to make us aware of any gaps in our security through our security bounty program.
We invite any users of our services to contact us at any time if they have any questions or concerns regarding security (or any other topics).