Trust Center

How we’re securing and protecting
your information

Trust Center

 

How we’re securing and protecting
your information

Security is more than just secure software.

Intertek has certified Adeption’s conformity with ISO/IEC 27OO1:2O22, recognizing that we manage data securely across every level of our organization. From our technical infrastructure to our internal decision-making, we follow global best practices to keep your information safe.

Our Trust Center outlines how we do this.

Data security

We respect and protect your personal data

Product security

We provide a secure platform environment

Infrastructure security

Safeguarding your data

Use of AI

We use AI in a considered way

We respect and protect your personal data

 

At Adeption, we understand the significance and value of the data entrusted to us by our clients and stakeholders. Our commitment to safeguarding this data is unwavering and is at the very heart of our operations. Recognizing the rapidly evolving digital landscape and the complexities of modern cyber threats, we have implemented robust measures that encompass application security, identity protection, infrastructure security, and rigorous adherence to compliance and industry standards. This document serves to outline our comprehensive data security policies, reflecting our dedication to ensuring that our digital environments are resilient, secure, and trustworthy. Our approach to data security is not just about protecting our business; it’s about preserving the trust and confidence our clients have placed in us, and we are steadfast in our commitment to uphold and reinforce this trust every day.

Adeption’s information security policy is available here.

Last updated December 2O25.

We provide a secure platform environment

 

We are dedicated to giving our customers a highly secure and dependable environment since we know they want us to protect their data to the greatest standards. Our security model and controls are based on international standards and industry best practices, such as ISO 27OO1, and OWASP Top 1O.

Application Security

We engage in secure design and coding practices, engaging in secure application security practices as early as possible in our development cycle. We also consistently engage in ongoing testing and penetration testing on our application, to catch and remediate bugs that do make it through our development cycle.

Our controlled CI/CD process includes static code analysis, end-to-end testing, unit testing which addresses authorization aspects and more. You can read more about Adeption’s application security processes here

Identity Protection

Adeption uses Azure AD (Active Directory) for identity management. Azure AD’s identity management capabilities improve security, simplify user access, and reduce the reliance on passwords, ultimately enhancing the overall security posture.

  • Single Sign-On (SSO): Azure AD enables users to sign in once and access multiple applications and services without the need for separate passwords. This enhances convenience and productivity while reducing the risk of weak or reused passwords. 
  • Password Protection: Azure AD Password Protection helps prevent the use of weak or easily guessable passwords by enforcing custom password policies and blocking common password patterns. It helps protect against brute force attacks and significantly strengthens the security of user credentials. 
  • Multi-Factor Authentication (MFA): Azure AD supports MFA, which adds an extra layer of security by requiring users to provide additional verification factors (such as a mobile app notification, SMS code, or biometric data) during the sign-in process. MFA significantly reduces the risk of unauthorised access even if passwords are compromised.

 

We safeguard your data

 

Infrastructure security is crucial for maintaining the confidentiality, integrity, and availability of data and systems. We’ve partnered with Microsoft Azure, taking full advantage of their Cloud services. These services allow us to capture, process and store data securely while respecting data sovereignty.

Data Hosting and Storage

Adeption services and data are hosted across multiple Availability Zones in Microsoft Azure facilities in Dublin, Ireland (north-eu). We have also established a disaster recovery site in Amsterdam, Netherlands (west-eu). This allows us to provide a reliable service and keeps your data available whenever you need it. These data centres employ leading physical and environmental security measures, resulting in highly resilient infrastructure. Further information is available here.

Data Encryption

Adeption encrypts all data both in transit and at rest:

  • Traffic is encrypted using TLS 1.2 with a modern cipher suite
  • User data is encrypted at rest across our infrastructure using AES-256 or better
  • Credentials are hashed and salted using a modern hash function

Additional Infrastructure Security

Our infrastructure is protected using multiple layers of defence mechanisms, including:

  • Firewalls for enforcing IP whitelisting and access through permitted ports only to network resources
  • A web application firewall (WAF) for content-based dynamic attack blocking
  • DDoS mitigation
  • Comprehensive logging of network traffic, both internal and edge

Endpoint Security

Adeption enforces endpoint security for all devices that access its networks and systems. Adeption uses Sophos XDR and MDM to protect devices and to ensure they are free of security threats and applies policies to devices to reduce risk of data loss and unauthorized access.

Failover and DR

Adeption was built with disaster recovery in mind. All of our infrastructure and data are spread across 2 Azure datacenters  and will continue to work should any one of those data centres fail.

Our latest Disaster Recovery (DR) plan is available here.

Data Retention

Adeption complies with the internationally recognized standards for data protection and security (including GDPR requirements).  A client or end user can request at any time to have their data removed or deleted from the platform and Adeption will do this.

Note: If user data is deleted from the platform, users cannot reactivate this data.  Adeption recommends that users maintain their account even after completing an experience so that this data is available for a future experience that they may engage in.

Adeption users have access to an independent arbitrator (AAA-ICDR) should they have any data protection concerns.

External Certification, Security Audits and Penetration Tests

Adeption is ISO/IEC 27OO1:2O22 certified with Intertek UKAS across all of its entities and regions.
Click here for Adeption’s ISO certificate.

Adeption regularly engages an independent third-party organisation to assess and evaluate the effectiveness of our security controls, practices, and policies, providing an objective perspective and validating the robustness of the data security measures in place. Adeption also conducts penetration tests on an annual basis both in the application and in the infrastructure level using well-known, independent auditors.

Subprocessors

Adeption engages Subprocessors to power its platform and run the business.  These partners maintain industry standards related to information security and data protection. Below is a full list of Adeption’s Subprocessors and how they use the data shared with them. Adeption Sub Processors

What personal data we collect and how use it

Adeption requires name and email address as mandatory information. This is the only mandatory personal identifiable information (PII) Adeption stores. Optional PII includes a user’s position, title and phone number. Adeption also stores non-personal information including: written responses to questions, photos or videos as a part of their coaching experience. Further information about the information that Adeption collects can be found in Adeption’s Privacy and Use of Data Policy.

We use AI in a considered way

 

Adeption applies innovative technology to engage users in coaching experiences leveraging the principles behavioral science.  One such technology is Artificial Intelligence (AI) which Adeption applies in several ways:

  • Tool and insight prediction
  • Leadership mindset indication 
  • AI questions and responses in coaching workouts

Adeption has developed its own Proprietary AI (algorithms) to provide these features and range of leadership development solutions. Adeption’s AI is not open source and does not share any data outside of our client environments. Adeption uses non-identifiable aggregated data to improve its accuracy of AI features and does not use personal information for any training.

Find out more about how we use AI to scale high-quality leadership development here.

Additional security measures

 

Employee training

All our employees undergo thorough information security awareness training during onboarding. Further security training and awareness programs are provided on a regular basis.

Security policies

Adeption has developed a comprehensive set of information security management system policies that are aligned with ISO27OO1 standards. These policies are updated frequently and shared with all employees.

Employee vetting

Adeption performs background checks on all new employees in accordance with local laws. The background check includes verification and criminal checks.

Employee confidentiality

All employee contracts and contractor agreements include a confidentiality agreement. Additionally all employees with privileged access need to agree to additional system administrator confidentiality terms.

If you would like any further information,

please get in touch

 

US

6 Liberty Square # 28OO
Boston, MA O21O9
US

NZ

Suite 1O79O,
17B Farnham St
Parnell, Auckland 1O52
NEW ZEALAND

AU

Suite 796,
585 Little Collins Street
Melbourne, Victoria 3OOO
AUSTRALIA

INDIA

Casa 9, Baner Rd,
Baner, Pune
MH 411O45
INDIA