Skip to main content
Last updated: January 2026 Data security and privacy are foundational to the HoopAI platform. We employ a defense-in-depth strategy with multiple layers of protection across infrastructure, application, and operational processes to safeguard your data.

Our commitment

HoopAI is built on the principle that your data belongs to you. Our security program exists to protect it — we never sell your data, never share it across customers, and use it only as permitted in our Terms of Service and Privacy Policy. Our security program is driven by compliance and regulatory requirements as well as industry best practices including the OWASP Top 10 and the CIS Critical Security Controls.

Infrastructure security

Cloud-hosted infrastructure

HoopAI production systems are hosted on Amazon Web Services (AWS) and Google Cloud Platform (GCP) — both SOC 2 Type 2 and ISO 27001 certified providers with dedicated security staff, strictly managed physical access control, and 24/7 video surveillance.

Regional data hosting

Customers have the option to store their data in US or EU data center regions. Existing customers can migrate between regions using our data migration tools.

Physical security

All data centers feature multi-factor access controls, biometric authentication, security guards, and continuous video monitoring. Physical access is restricted to authorized personnel only.

Redundancy

Production systems are deployed across multiple availability zones for high availability and fault tolerance, with automated failover capabilities.

Data encryption

All data is encrypted both at rest and in transit using industry-standard protocols.
LayerMethodDetails
At restAES-256 CBCPhysical and virtualized hard drives, database storage, backups
In transitTLS v1.2+All API calls, authenticated sessions, inter-service communication
Web trafficSSL/HTTPSStandard SSL certificates on all HoopAI-hosted content by default
PasswordsHashed + encryptedUser passwords are hashed using industry-standard algorithms and encrypted at rest
Key managementAWS KMS / GCP KMSEncryption keys managed through cloud-native key management services with automatic rotation

Access controls

HoopAI enforces finely-grained authorization rules. Customers can create and manage users, assign roles, and configure permissions at the feature and field level. Access follows the principle of least privilege — users receive only the permissions necessary for their role.
Each customer account is logically isolated with subaccount-based authentication. Data is partitioned at the account level to prevent cross-account data access.
API authentication uses encrypted signed tokens with defined scopes and expiration. Tokens are validated on every request.
The platform enforces a uniform password policy requiring a minimum of 8 characters with a combination of uppercase and lowercase letters, numbers, and special characters.
All users are encouraged to enable 2FA on their accounts. Two-factor authentication requires verification via a second device (e.g., authenticator app or SMS) at login.
SAML-based SSO integrated with any SAML-based identity provider is available with enterprise-tier subscriptions. Google sign-in is available on all plans.

Network security

Endpoint protection

All endpoints are monitored with enterprise-grade endpoint detection and response (EDR) solutions.

Managed firewalls

Network traffic is filtered through managed firewalls with strict ingress and egress rules.

DDoS protection

Distributed denial-of-service protection is deployed at the network edge to absorb and mitigate volumetric attacks.

Network segmentation

Production, staging, and development environments are logically segmented to limit lateral movement.

Application security

All production services run on standardized, hardened container images with minimal attack surface. Images are scanned for vulnerabilities before deployment.
Infrastructure and application configurations are managed through version control with code review requirements, ensuring all changes are auditable and reversible.
Dependencies and base images are regularly updated to incorporate the latest security patches. Automated pipelines ensure timely deployment of critical updates.
Our engineering team follows secure coding practices aligned with the OWASP Top 10. Code undergoes peer review and automated security scanning before deployment.

Monitoring and logging

  • Google Cloud Ops and AWS CloudWatch provide real-time infrastructure monitoring, alerting, and anomaly detection
  • Audit logs capture all user actions, administrative changes, and data access events
  • Centralized log management aggregates logs across all services for correlation and forensic analysis
  • Alerting is configured for suspicious activity, unauthorized access attempts, and system anomalies
  • Third-party MSSP SOC monitoring provides 24/7 security operations center oversight

Incident response

HoopAI maintains a formal incident response plan with defined escalation procedures.
PhaseDescription
DetectionAutomated monitoring and alerting identify potential security incidents in real time
ContainmentImmediate containment measures are enacted to limit the scope and impact of an incident
InvestigationRoot cause analysis is performed to understand the nature and extent of the incident
RemediationAffected systems are restored, vulnerabilities are patched, and preventive measures are implemented
NotificationAffected customers are notified within 72 hours of a confirmed data breach, in accordance with applicable law
Post-incident reviewA post-mortem review is conducted to identify lessons learned and improve response procedures

Vulnerability management

Regular automated vulnerability scans are performed across all production systems using industry-leading scanning tools.
HoopAI engages independent third-party security firms to conduct annual penetration tests against our production environment. Findings are remediated according to severity.
Critical security patches are applied within defined SLAs. A structured patch management process ensures timely remediation without service disruption.
You are permitted to penetration test HoopAI products as long as you adhere to our published guidelines and submit findings through our vulnerability disclosure program. Report vulnerabilities to security@hoopai.com.

Business continuity

  • Backup frequency: 5-minute granularity for production databases (AWS and Google Cloud)
  • Backup storage: Encrypted backups stored across multiple availability zones
  • Restore capability: Point-in-time recovery available for all critical data stores
  • Disaster recovery: Documented disaster recovery procedures with defined RPO and RTO targets
  • Uptime commitment: 99.95% monthly uptime for subscription services (see Product-Specific Terms)

Compliance and certifications

Certification / FrameworkStatus
SOC 2 Type 2Maintained — attesting to availability, confidentiality, and security controls
ISO 27001Infrastructure providers (AWS, GCP) certified
EU-U.S. Data Privacy FrameworkCertified
UK Extension to EU-U.S. DPFCertified
Swiss-U.S. Data Privacy FrameworkCertified
HIPAA Seal of ComplianceAchieved through Compliancy Group
GDPRCompliant — see our Data Processing Agreement
OWASP Top 10Security controls aligned
CIS Critical Security ControlsSecurity program guided by CIS benchmarks
To request a copy of our SOC 2 Type 2 report, please contact legal@hoopai.com.

Employee security

  • All employees and contractors are bound by confidentiality obligations as part of their employment or engagement agreements
  • Access to customer data is restricted on a need-to-know basis aligned with job function
  • In-house IT security team manages day-to-day security operations
  • Third-party Managed Security Service Provider (MSSP) provides 24/7 SOC monitoring
  • Security awareness training is conducted regularly for all personnel
  • Background checks are performed for employees with access to production systems

Data minimization and quality

  • HoopAI collects only the minimum data required to provide requested services
  • Many data fields are optional — customers control what information they store
  • Two-factor authentication is available to ensure data quality by verifying user identity
  • Permanent record deletion capabilities support GDPR right-to-erasure requests
  • Data retention policies ensure data is not kept longer than necessary

Your responsibilities

While HoopAI provides a secure platform, security is a shared responsibility. We recommend that customers:
  • Enable two-factor authentication on all user accounts
  • Use strong, unique passwords and rotate them regularly
  • Configure user roles and permissions following the principle of least privilege
  • Review audit logs regularly for unusual activity
  • Keep integrations and connected third-party applications up to date
  • Report suspected security issues promptly
HoopAI is not responsible for security incidents arising from customer misconfiguration, compromised customer credentials, or vulnerabilities in third-party applications connected to the platform.

Report a vulnerability

If you discover a security vulnerability in the HoopAI platform, please report it responsibly:
  • Email: security@hoopai.com
  • Include a detailed description of the vulnerability, steps to reproduce, and any supporting evidence
  • We will acknowledge receipt within 48 hours and provide an initial assessment within 5 business days
  • We do not pursue legal action against security researchers who act in good faith

Contact us

If you have questions about HoopAI’s security practices, please contact us:
Last modified on March 6, 2026