The Teacup Analytics Privacy And Security Promise

We always respect your data. No tomfoolery!


We respect your data and we’ll keep it yours. We won’t sell it to 3rd parties or use it for nefarious purposes. Period!

We also won’t store your Google Analytics username and password. And, in case you were wondering, we don’t make any changes to your Google Analytics account.

Here’s what we will do. We’ll use your data to help you grow your audience and your business. We’ll use your data to help you achieve your goals. That means we’ll need to store your data, which we’ll do securely. At some point, we may use non-personal, anonymized information to glean more general insights like benchmarking. We’ll always make totally sure that your privacy is paramount.

Security Basics:

The Teacup website uses a secure connection to your browser called Transport Layer Security (TLS) - that’s https:// instead of boring old http://. TLS is a cryptographic protocol that makes communication between your browser and Teacup secure. You can learn more about this here.

Advanced Security:

Teacup Analytics' physical infrastructure is hosted and managed within Amazon’s secure data centers and utilize the Amazon Web Service (AWS) technology. The data centers are certified ISO 27001 and FISMA, housed in nondescript facilities, and critical facilities have extensive setback and military grade perimeter control berms as well as other natural boundary protection. Physical access is strictly controlled both at the perimeter and at building entry points.

Your data along with any credit card transactions are processed using secure encryption—the same level of encryption used by leading banks. Card information is transmitted, stored, and processed securely on a PCI-Compliant network certified to PCI Service Provider Level 1. This is the most stringent level of certification available.

Our software infrastructure is updated regularly with the latest security patches. Teacup runs in an isolated network which is locked down with the highest-grade industrial firewalls and is carefully monitored. While flawless security is something of an elusive goal, we go above and beyond in providing impeccable security.

Backups:

Teacup utilizes both replication and network backups to ensure both redundancy and recovery from possible failure. We keep consistent up-to-the-second replications of data for immediate failover protection, and performs nightly live backups of all data in case of replication failure. Our infrastructure is designed to scale and be fault tolerant by automatically replacing failed instances and reducing the likelihood of needing to restore from backup.