Skip to content
Building high-performing consumer promotions in 30 minutes with Komo Register here


At Komo, we take security and privacy seriously. Let's explore the ways in which we safeguard your data. 



At Komo, we take security and privacy seriously. Let's explore the ways in which we safeguard your data. 


product security


Manage access to your account

We offer advanced access management features that allow users to manage and monitor access to their accounts and set role-based permissions.

Control usability with user access levels

Our customers have granular control over user access levels, enabling our users to define access privileges and visibility for each team member.

Password protection guidance

We prioritize password security with guidance, encouragement for password managers, and complexity requirements.

Robust Infrastructure Security

24/7 Support for Critical Issues
We provide 24/7 support for critical issues to ensure that our users receive prompt assistance and resolution of any issues that may affect their ability to use our products and services.
Point-in-Time Recovery
We offer recovery capabilities that enable our users to restore their data to a specific point in time, allowing them to recover from accidental deletion or data corruption with precision and ease.
Regular Security Updates
We regularly release security updates that address known vulnerabilities and potential threats, ensuring that our systems and software are up to date with the latest security patches and fixes.
Network & Encryption Protection
We secure our network and protect our users' data with advanced encryption technologies, using industry-standard protocols to ensure the confidentiality, integrity, and authenticity of all data transfers.
Daily Backups
We protect our users' data from unexpected events such as hardware failure or data corruption by performing daily backups of all user data and storing it in secure, off-site locations.

Our Commitments to data security

Group 3660 5
Data Processing Agreement
We comply with data protection regulations and offer our users a data processing agreement that outlines our commitment to protecting their data and sets out the terms of our data processing activities.
Group 3660 4
Privacy Policy
We have a comprehensive Privacy Policy that explains our data collection, use, and sharing practices, and provides our users with the transparency and control they need to make informed decisions about how their data is used and processed within our platform.
Group 3660 3
Terms of Service
Our Terms of Service document outlines users' rights and obligations, the limitations of liability, and the applicable laws and jurisdiction, ensuring that our users have a clear understanding of the expectations and requirements of using our service.
Group 3660 2
You own the data
All the data you collect via the Komo Platform is yours to own. We never sell our user data.
Group 3660
Data Protection Officer
Our dedicated data protection officer, Glenn, is responsible for ensuring that our data processing activities comply with data protection laws and regulations.

What our clients are saying


How is data stored once collected and how private is this data?
Data captured from a form is stored in our Postgres database, hosted in Google Cloud. Only your own company users in the Komo Portal can access the data.
When and/or how do you dispose of data following a campaign?
We do not delete any data without your explicit consent - You can delete a hub at any point, at which point it will be scheduled for deletion within 30 days.
Are all data collection processes compliant at Komo?
Yes, all data collection is compliant at Komo. But please also be aware that customers are responsible for setting up data capture forms, so proper collection guidelines should be adhered to when setting up these forms.
What systems do you use for data collection and storage?
All our data is hosted on Google Cloud, specifically Cloud Storage, PostgresQL & Redis for data storage. Click here for more information on Google Cloud.