Trust & Security

Last updated:

0 tracking scripts on any pageFirst-party analytics onlyYour data is never soldYour data never trains AIAll sub-processors listedGDPR and CCPA compliant

Most B2B tools ask you to trust their privacy policy. We’d rather you didn’t have to. Kustiq is built so that the security claims on this page are verifiable, not just stated. Every architecture decision, from zero third-party scripts to first-party analytics, exists so you can confirm it yourself.

Most SaaS products load 15 to 30 third-party scripts. Kustiq loads zero.

We built our own analytics

Kustiq does not use Google Analytics, Facebook Pixel, Mixpanel, Segment, Hotjar, or any third-party tracking service. Every usage metric is collected through our own first-party analytics infrastructure. The only cookies we set are strictly necessary for authentication and session management. No advertising cookies, no tracking pixels, no behavioral fingerprinting. Open your browser DevTools on any Kustiq page to verify.

Your data is never sold

Kustiq generates revenue from subscriptions and credits. We do not sell, rent, license, or share your data with third parties. Your account data, profiling results, outreach pipeline output, and usage patterns are yours. No data brokers, no advertising networks, no “anonymized” data sharing. No third party, including competitors, can purchase your data from us.

Your data never trains AI models

Kustiq uses Anthropic’s API for company profiling. Anthropic’s commercial API terms contractually prohibit using inputs or outputs for model training. Your company data, profiling results, and outreach intelligence are processed, returned, and not retained by the AI provider. We do not use your data to fine-tune, train, or improve any AI model. See Section 3 of our Data Processing Agreement for the full contractual language.

Infrastructure you can verify

Your data is stored in PostgreSQL databases hosted by Supabase (US East) and on Kustiq’s own dedicated server infrastructure (Hetzner, Germany). All connections use TLS encryption in transit. Databases use AES-256 encryption at rest. Stripe handles payment processing under its own PCI-DSS compliance. We do not store credit card numbers.

Database backups are performed daily with point-in-time recovery capability provided by Supabase. VPS infrastructure uses automated daily snapshots.

Security by default

We store only the fingerprint (SHA-256 hash) of your API key, never the key itself. Webhook payloads are cryptographically signed (HMAC-SHA256) so your integrations can verify every message came from Kustiq. HubSpot OAuth tokens are encrypted at rest and never exposed to third parties. Your team’s access is governed by role-based permissions with 6 granular controls (e.g., who can export data, who can manage billing).

Security controls summary
ControlStatus
Encryption in transitTLS on all connections
Encryption at restAES-256 (Supabase managed)
API key storageSHA-256 hashed, never plaintext
Webhook signingHMAC-SHA256
Role-based access control6 granular permissions
Access loggingAll production access logged
Breach notification SLA72 hours (GDPR Art. 33)

Minimal sub-processors

Supabase
Database hosting and authentication
United States
Stripe
Payment processing
United States
Vercel
Frontend hosting and edge delivery
United States
Anthropic
AI language model inference during profiling
United States
Serper
Web search API for public data gathering
United States
Hetzner
API server hosting and data processing infrastructure
Germany
Resend
Transactional email delivery
United States
HubSpot
CRM data synchronization (when integration enabled)
United States
Saleshandy
Outbound email delivery for sales communications
United States
Google Workspace
Business email and customer support communications
United States

No third-party data providers, no third-party analytics services, no ad networks. Your data touches ten services, all with a clear purpose and under standard data processing agreements. Anthropic processes profiling requests via API and does not retain inputs or outputs beyond the processing window.

Your data rights

You have full control over your data. Under GDPR and CCPA, you can:

  • Access all personal data we hold about you
  • Correct inaccurate data
  • Delete your account and all associated data
  • Export your profile data in CSV or JSON format (data portability)
  • Object to processing based on legitimate interest
  • Withdraw consent at any time (e.g., marketing communications)
  • Restrict processing in certain circumstances

To exercise any of these rights, email support@kustiq.com. We respond within 30 days. See our Privacy Policy for full details.

Data lifecycle

  • While active: your account data and generated profiles are retained for as long as your account is active.
  • After cancellation: you have 30 days to export your data through the dashboard export feature.
  • Deletion: personal data is removed within 30 days of account deletion. Database backups containing your data are purged automatically within 7 days of primary deletion.
  • Intermediate data: web pages retrieved during profiling are used transiently. Cached copies may be retained up to 90 days for performance, then purged.
  • Aggregated data: anonymized, aggregated data that cannot identify you or your organization may be retained for product improvement.

Compliance

Kustiq is operated by Analytics Lab S.R.L. (CUI: RO50212590), registered in Romania.

GDPR: we process data under contractual necessity and legitimate interest, with full data subject rights (access, correction, deletion, portability, objection). International transfers are protected by the EU-US Data Privacy Framework and Standard Contractual Clauses (SCCs).

CCPA/CPRA: for California residents, Kustiq acts as a Service Provider under CCPA. We do not sell personal information and have not done so in the preceding 12 months. Full CCPA rights are described in our Privacy Policy.

Automated decision-making: Kustiq generates AI-powered company profiles, churn risk assessments, and qualification assessments. These outputs are informational tools designed to assist your team’s decision-making, not to produce legal effects or similarly significant effects on any data subject. You retain full control over any decisions made based on these outputs.

Our security controls are documented in our DPA (Section 5: Technical Measures) and available for customer audit upon request (DPA Section 8).

Breach notification

In the event of a data breach affecting your personal data, we will notify you and any relevant supervisory authority within 72 hours of becoming aware, in accordance with GDPR Article 33. The notification will include:

  • The nature of the breach
  • Categories and approximate number of affected records
  • Likely consequences of the breach
  • Measures taken or proposed to address the breach

To date, Kustiq has had zero data breaches. For full breach notification procedures, see DPA Section 7.

Responsible disclosure

If you discover a security vulnerability in Kustiq, please report it to support@kustiq.com with the subject line “Security Report.” We will acknowledge your report within 72 hours and work with you to understand and resolve the issue. We will not take legal action against good-faith security research conducted in accordance with this policy.

Verify it yourself

Open your browser's DevTools on any Kustiq page. You will find zero requests to Google, Facebook, Mixpanel, Segment, or any third-party analytics service. We built our own.

You can also notice the lack of a cookie consent banner. Kustiq doesn’t set advertising or analytics cookies, so no consent popup is required.

Open the Network tab, then filter for google.com and facebook.com. You will see 0 results.

Questions about how we protect your data?

We respond to every message, typically within one business day. Reach out at support@kustiq.com or visit our support page.

Version history

  • v2.1 (): Added sub-processors (Saleshandy, Google Workspace).
  • v2.0 (): Added AI model training opt-out, data rights, data lifecycle, responsible disclosure, security controls table, encryption at rest, backup/recovery, access logging, CCPA section, automated decision-making, breach notification details, sub-processor locations.
  • v1.0 (): Initial publication.