<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1228022201129589&amp;ev=PageView&amp;noscript=1">
Skip to content

Trust Center

We are committed to protecting the security, privacy, and integrity of our customers’ data. This Trust Center provides transparency into the controls, certifications, and processes we use to safeguard your data and support your compliance requirements.

Our approach is built on recognized standards and continuously evolves to meet changing security and regulatory needs.

Compliance

  • compliance-iso-27001ISO 27001
  • compliance-gdprGDPR
  • compliance-ccpaCCPA
  • CANSPAM
  • compliance-eu-ai-actEU AI ACT
  • compliance-compliance-nis2-directiveNIS 2 Directive

Vendors & Integrations

View all Vendors & Integrations
  • Product Fruits
    i-nexus uses Product Fruits to deliver in-app guidance, onboarding experiences, and feature announcements. Product Fruits may process limited usage data and user identifiers in order to provide product experience and onboarding functionality.
  • Google Analytics
    i-nexus uses Google Analytics to understand website usage and improve user experience. Google Analytics processes aggregated usage data and may process IP addresses and device identifiers in accordance with configured privacy and cookie controls.
  • AWS
    i-nexus uses AWS to host and operate its cloud infrastructure, including application services, data storage, and backups. Customer data is processed within region-specific environments with appropriate safeguards, including Standard Contractual Clauses (SCCs) where required.
  • Amazon Cognito
    i-nexus uses Amazon Cognito to manage user authentication and identity services. This includes processing login metadata and authentication tokens within secure AWS-hosted environments. 
  • Organizational Controls
    People, Policies & Governance
  • People Controls
    Workforce Security & Responsibilities
  • Physical Controls
    Premises, Equipment & Environment
  • Technological Controls
    Systems, Networks & Software Security