Discover Brand Kits: Exclaimer's new method for governing your brand across the digital communications that matter most.Find out more

Security measures

These technical and organisational measures describe the security and governance controls implemented by Exclaimer to protect Personal Data processed through use by its customers of its subscription services (Customer Data).

For the purposes of Article 32 UK GDPR, EU GDPR, and equivalent data protection legislation, these measures demonstrate that Exclaimer:

  • implements appropriate technical and organisational safeguards

  • protects Customer Data against accidental or unlawful destruction, loss, alteration, unauthorised disclosure, or access

  • maintains the confidentiality, integrity, availability, and resilience of processing systems

  • maintains appropriate governance, risk management, and oversight

  • ensures appropriate controls relating to data residency and regional processing

These measures reflect Exclaimer’s certified Information Security Management System (ISMS) and independently audited control environment.

Further information regarding Exclaimer’s security posture, certifications, and whitepapers is available at: https://trust.exclaimer.com (registration required)


1. Governance and Organisational Security

Information Security Management System

Exclaimer maintains a documented Information Security Management System certified to ISO/IEC 27001:2022 and ISO/IEC 27018:2019. The ISMS defines security governance, risk management processes, control objectives, monitoring mechanisms, and continuous improvement procedures.

Independent Assurance

Exclaimer undergoes annual independent SOC 2 Type II audits covering Security, Availability, and Confidentiality trust principles.

Policies and Risk Management

Exclaimer maintains a comprehensive suite of documented information security, data protection, operational, and governance policies supporting its ISMS. These policies address, among other areas:

  • information security governance

  • risk management

  • access control and identity management

  • cryptography and key management

  • secure development and change management

  • incident management and breach response

  • business continuity and disaster recovery

  • vendor and supplier risk management

  • data protection and GDPR compliance

  • employee security and confidentiality

Information security and data protection risks are formally identified, assessed, and treated through a structured risk management process, with oversight by senior management.


2. Data Residency, Regionality, and Customer Control

Customer-Selected Data Region

Exclaimer provides regional hosting options. Customers select their data region at the time of service provisioning. Customer Data processed by the subscription services is processed within the region selected by the customer.

Regional Processing

Exclaimer’s infrastructure is deployed in regionally segmented cloud environments designed to support data residency commitments in respect of Customer Data.

Customer Data remains within the selected region as part of normal service operation, subject only to:

  • customer-initiated configuration choices

  • applicable legal requirements

  • limited, controlled access required for authorised support or security purposes under appropriate safeguards

Exclaimer does not unilaterally relocate Customer Data across regions. Any change to a region where Customer Data is processed for a customer would be made in conjunction with that customer.

Customer Sovereignty and Control

Customers retain control over the region in which Customer Data is processed and may select or migrate regions in accordance with available service options.


3. Data Processing Architecture and Storage Transparency

Exclaimer provides two primary deployment models: server-side processing and client-side processing.

Server-Side Processing (Mail Flow Architecture)

In server-side deployments, customer emails are routed to Exclaimer via a customer-configured mail flow rule within the customer’s email platform.

Under this model:

  • emails are securely transmitted to Exclaimer for processing in transit

  • the message is processed solely for the purpose of applying centrally managed signatures and disclaimers

  • the processed email is returned to the customer’s mail environment as part of normal mail flow

Exclaimer does not persistently store email message content (including email bodies or attachments) as part of routine service operation.

Exclaimer does not:

  • archive customer email messages

  • maintain historical copies of processed messages

  • provide any facility within the service for personnel to browse, search, or review customer email bodies

Email content is processed only to the extent technically necessary to apply configured signatures or routing logic and is not retained following processing as part of normal operations.

If access to email content is required to address a specific support request, such access will occur only where the customer has explicitly provided the content or granted express permission for that purpose.

Client-Side Processing (Outlook Add-In)

In client-side deployments (e.g., Outlook Add-in):

  • signature rendering occurs locally within the user’s email client

  • the email body remains within the customer’s environment

  • Exclaimer does not receive, process, or transmit the email body

  • Exclaimer has no access to the content of the email message

Under this model, Exclaimer processes only the configuration and directory data necessary to render the signature.

Data Stored by Exclaimer

Exclaimer stores only the data necessary to configure, administer, and operate the Services. This may include:

  • signature templates and rule configurations

  • customer tenant configuration settings

  • directory attributes synchronised from the customer’s email platform (e.g., name, job title, department, business contact details)

  • administrative account information

  • service metadata and operational logs

  • support case information provided by the customer

Data Not Stored by Exclaimer

As part of normal service operation, Exclaimer does not store:

  • customer email inboxes

  • full email bodies

  • email attachments

  • historical message archives

Access Controls Over Stored Data

Where configuration data, directory attributes, logs, or support information are stored:

  • access is restricted according to role-based access controls and least-privilege principles

  • administrative access is logged and monitored

  • access for support purposes is controlled and limited to authorised personnel


4. Access Control and Identity Management

Role-Based Access

Access to systems processing Customer Data is restricted on a least-privilege basis and aligned to defined role responsibilities.

Authentication Controls
  • Multi-factor authentication (MFA) is enforced for administrative and privileged access

  • Strong authentication controls are implemented for production systems

Provisioning and Deprovisioning

User access is subject to formal approval procedures. Access rights are reviewed periodically and removed promptly upon role change or termination.

Privileged Access Management

Privileged access is restricted, monitored, and subject to enhanced oversight and logging.

Logical Segregation

Logical controls are implemented to prevent unauthorised cross-customer access to data.


5. Data Confidentiality and Encryption

Encryption in Transit

Customer Data is encrypted in transit using industry-standard TLS encryption.

Encryption at Rest

Where Customer Data is stored, encryption at rest is implemented using strong cryptographic standards.

Cryptographic Governance

Cryptographic controls and key management practices are governed by documented policies aligned to recognised industry standards.


6. Availability, Resilience, and Business Continuity

Infrastructure Resilience

The Services are hosted in secure cloud infrastructure environments designed for high availability, resilience, and redundancy.

Redundancy and Failover

Systems are architected with redundancy and failover capabilities to minimise service disruption.

Business Continuity and Disaster Recovery

Documented Business Continuity and Disaster Recovery Plans are maintained, reviewed, and tested periodically.

Monitoring

Availability, performance, and security events are continuously monitored with defined escalation procedures.


7. Incident Detection and Response

Incident Management Framework

Exclaimer maintains documented incident management and information breach procedures.

Detection and Logging

Security monitoring, logging, and alerting mechanisms are implemented to detect unauthorised or anomalous activity.

Response and Containment

Security incidents are investigated, contained, remediated, and documented in accordance with formal procedures.

Breach Notification

Where required by applicable law or contract, Exclaimer will notify the Controller of a confirmed Personal Data Breach without undue delay.


8. Vulnerability and Change Management

Secure Development Practices

Secure development practices govern system design, code review, testing, and release management.

Change Management

Changes to production systems are subject to documented testing, approval, and rollback procedures.

Vulnerability Management

Regular vulnerability scanning is performed. Security patches are applied according to risk-based prioritisation. Independent security testing is conducted periodically.


9. Supplier Security and Due Diligence

Due Diligence

Exclaimer conducts appropriate security and data protection due diligence prior to engaging suppliers that may process Customer Data.

Contractual Safeguards

Suppliers processing Customer Data are subject to written agreements imposing confidentiality, security, and data protection obligations consistent with applicable law.

Ongoing Oversight

Suppliers are subject to periodic review to ensure continued compliance with security and data protection requirements.


10. Employee Security and Awareness

Background Screening

Pre-employment screening is conducted where permitted by law.

Security Training

Employees receive regular training covering information security, compliance and data protection. Training records are maintained within a learning management system.

Confidentiality

Employees are bound by confidentiality obligations as a condition of employment.

Disciplinary

Defined processes to manage violations of Exclaimer policies.


Reviews

Exclaimer maintains processes for internal audit, management review, corrective action, and improvement in alignment with its certified ISMS and independent audit requirements.