Skip to main content
Log in


Hero background

Your data is always secure

Customer trust and data security are critical to everything we do. We keep your data in your hands.

Get startedBook a demo

Trusted by teams at


Trusted by teams at

SOC 2 Type 2 compliant.

SOC 2 Type 2 compliant

Your data stays secure, available, and confidential. To see our report, contact us at

GDPR compliant.

GDPR compliant

If you’re in the EU, your data is only processed on EU data centers.

HIPAA compliant.

HIPAA compliant

Healthcare companies like ThirtyMadison, Chapter Health, and Headway trust Hightouch.

CCPA compliant.

CCPA compliant

To see our DPA (Data Processing Addendum), contact us at

Your data in your warehouse

Novel hybrid architecture

Hightouch never stores any of your data. We believe you should maintain control and take advantage of your existing architecture. Here’s how your data passes through Hightouch:

  • Hightouch runs queries directly on your warehouse.
  • You can choose to store all customer data temporarily in your cloud.
  • Hightouch transfers data to your destination without ever storing it.
Novel hybrid architecture.

Control access on your own terms

Product security

We provide security features to ensure that only authorized users can access and change Hightouch resources.

  • Control who has access to certain models, destinations, and syncs.
  • Ensure all changes are approved, and rollback unintended changes immediately through Git.
  • Connect with multiple auth providers so only members of your organization can access your Hightouch workspace.
Product security.

We follow industry security standards

Internal security

Our platform architecture and industry compliance certifications mean that your data is always secure.

  • We complete regular security-design reviews, pen tests using trusted security vendors, and conduct regular audits such as SOC 2 Type 2
  • We encrypt all data at rest and protect it in transit with TLS. Hightouch’s metadata database is encrypted by Amazon AWS using standard AES-256 encryption algorithms.
  • We limit internal access to tools and resources using time-based access.
Internal security.

Ready to activate your data?

Get startedBook a demo