We continually work to improve the security of our application. This commitment extends to our product and infrastructure design, which incorporates cutting-edge security techniques and browser features.
2-Factor Authentication is available for all customers and IP address restrictions can also be configured as an extra level of access control for both the application and the API. These measures significantly enhance the security of user accounts and data access.
For customers that need to access more than one account, we help to provide full visibility over your configuration through the use of your profile in conjunction with user roles to define how an account can be accessed. This system ensures granular control and transparency across multiple accounts.
Our application is fully encrypted over HTTPS using TLS and is up to date with the most modern cryptography standards. This encryption protocol safeguards all data transmissions, maintaining the highest level of security for our users.
Companies trust us
Application Security

Data Sovereignty
Spotzee stores your data, including all backups and disaster recovery systems in the European Union - Primarily Amsterdam and Germany. We chose Europe as it has the toughest privacy and security laws in the world.
Spotzee is based in Australia and New Zealand. All our data processor providers have been checked to be all GDPR-compliant (Cloudflare, DigitalOcean, Stripe). See the DPA we provide for a full list of our providers.
We use relay servers outside EU to reduce latency for users connecting for terminals far from our EU servers. Those servers do not store any data except connection logs (IP address, date of connection, user-agent and source website). Those relay servers are hosted in The United States of America, United Kingdom and Singapore.
Spotzee is based in Australia and New Zealand. All our data processor providers have been checked to be all GDPR-compliant (Cloudflare, DigitalOcean, Stripe). See the DPA we provide for a full list of our providers.
We use relay servers outside EU to reduce latency for users connecting for terminals far from our EU servers. Those servers do not store any data except connection logs (IP address, date of connection, user-agent and source website). Those relay servers are hosted in The United States of America, United Kingdom and Singapore.

Data Integrity & Disaster Recovery
Your data is kept separate from other users, where each account is logically separated to make sure that each account is secure and consistent.
Backups of your data are made at least every 24-hours and protected by industry-standard encryption, stored in local as well as off-site locations.
We store redundant copies of your data to ensure integrity and resilience. Our disaster recovery systems are designed so that we can quickly recover from the loss of a data centre or entire region, and we test our disaster recovery plans regularly according to a schedule.
Backups of your data are made at least every 24-hours and protected by industry-standard encryption, stored in local as well as off-site locations.
We store redundant copies of your data to ensure integrity and resilience. Our disaster recovery systems are designed so that we can quickly recover from the loss of a data centre or entire region, and we test our disaster recovery plans regularly according to a schedule.

Network & Data Centre Security
Our network infrastructure is designed to prevent intrusion through segmentation and other best practice techniques such as highly restrictive firewalls.
We have DDOS (Distributed Denial-Of-Services) plans in place and actively work with our networking providers to mitigate any problems.
Our Data Centre providers manage security for the facilities we use and provide continual monitoring.
We have DDOS (Distributed Denial-Of-Services) plans in place and actively work with our networking providers to mitigate any problems.
Our Data Centre providers manage security for the facilities we use and provide continual monitoring.

Internal Security
The networks used in our office and by our staff are continually monitored and highly restricted. We use Two Factor Authentication on all third-party services Spotzee uses. Our SSH keys are all password-protected.
We have very strict internal security procedures including various physical security measures, anti-virus and spam filtering, firewalls, network security and operating system security.
Every computer running Spotzee development tools is secured and up to date. All Spotzee employee computers are encrypted. No Spotzee employee computers are storing customer data.
We have very strict internal security procedures including various physical security measures, anti-virus and spam filtering, firewalls, network security and operating system security.
Every computer running Spotzee development tools is secured and up to date. All Spotzee employee computers are encrypted. No Spotzee employee computers are storing customer data.

Sign up to a Spotzee account with confidence
⚡ No Contracts. ⚡ No Hidden Charges. ⚡ No Strings Attached.
Let's get started





