At Bridge, protecting and managing your data is fundamental to our mission. Bridge organizes your work across tools. To achieve this, we rely on integrations with other apps to access your work for you.
We know that data is sensitive and strive to manage it with utmost care. We believe in the following principles:
- You are our user, not your data. We do not and will not sell your data.
- Your data should be protected like our own. We encrypt your data in transit and at rest.
- We handle your data on a need-to-know basis. We ask for the bare minimum amount of permissions from your tools to access the data needed to power the user experience.
Bridge uses industry-standard security protocols to authenticate with your tools and keep data secure. As a result, Bridge will never have access and therefore never store your passwords.
Bridge is committed to upholding industry standards for security & compliance expected from our customers. If you’re an IT or security representative for your company & are interested in getting more information, please contact security@bridge.do.
FAQ for IT & Security
What permissions do you ask for?
- Bridge accesses the minimum amount of data needed to help our customers with their work lives. The main goal of the product is to bring together tasks, documents, and discussions from all your tools in one place. To do this, we use official integrations our partners using industry-standard OAuth to securely access your data and request the minimum amount of permissions. You can find details of each integration here.
Does Bridge store my data?
- Bridge stores the minimum amount of data needed for our customers. We do not access or store passwords to your accounts. In general, we store, document titles and relevant metadata including created date, creator, updated dates etc. We store comments, and tasks so that we can provide a universal inbox for our users. You can find details of each integration here.
Is my data shared with third parties?
- Bridge will never sell or share your data for profit or co-marketing purposes. We use tools like Intercom to talk to you directly and work through any questions you may have. To do that well, we share your email address with that software to be able to serve you better.
You can find a complete list of 3rd party tools that we work with as subprocessors below.
How do you handle encryption?
- All data is encrypted in transit and at rest.
What is your Vulnerability Disclosure Policy?
- You can visit our policy here.
Do you have a list of Sub-processors?
- Amazon Web Services - Cloud Hosting - USA
- GitHub - Source Control / Version Control - USA
- Intercom - Customer Support / Engagement - USA
- Slack - Internal Messaging / Customer Support - USA
- Datadog - Error Tracking and Logging - USA
- Retool - Customer Support - USA
- Hex - Customer Support - USA
I have a question, who do I reach out to?