Product Talk's Interview Coach is coming to Vistaly
Join the waitlist

Vistaly Privacy & Security Fact Sheet

Last Updated: August 2025

Key Documents & Resources

Public Documentation

Available Upon Request

Business Plan Added Support

Business & Enterprise customers receive additional security support including:

Quick Reference

SOC 2 Type 2 Certified

GDPR Compliant

EU-U.S. Data Privacy Framework Certified

Infrastructure: AWS (SOC 1/2/3, ISO 27001/27017/27018/27701)

Security Contact: security@vistaly.com

Data Protection Officer: dpo@vistaly.com

1. Data Privacy & Rights

1.1 Your Data Ownership

→ See data ownership terms in our Terms of Service: Data Ownership section

1.2 Who Can Access Your Data

Our Employees

→ See full employee security requirements at Security Policy: Internal Security Measures

Third-Party Sub-processors

We maintain transparency about our sub-processors. Key processors include AWS (infrastructure), Stripe (payments), and select analytics/monitoring services.

→ Full list with compliance status at Sub-Processors

1.3 Your Control & Rights

→ See detailed data control procedures at Privacy Policy: Your Rights section

1.4 Geographic Data Processing

2. Data Security

2.1 Encryption

2.2 Access Controls

→ See complete access control specifications at Security Policy: Access & Identity Control

2.3 Infrastructure Security

→ See infrastructure security details at Security Policy: Cloud Security

2.4 Security Monitoring

→ See monitoring practices at Security Policy: Security Monitoring

2.5 Incident Response

→ See incident response procedures at Security Policy: Incident Response

2.6 Backup & Recovery

→ See backup and disaster recovery details at Security Policy: Data Protection

3. Data Isolation

3.1 Architecture

3.2 Customer Data Segregation

Vistaly implements comprehensive data isolation to ensure complete separation between customer organizations. Each customer organization's data is strictly separated and protected with dedicated access boundaries. All API endpoints enforce organizational boundaries, preventing any cross-organization data access.

Your team's data is never visible to other Vistaly customers. We implement defense-in-depth strategies with multiple security layers to ensure your organization's data remains completely private and isolated.

Technical architecture details available in Security Architecture Walkthroughs (Business/Enterprise plans)

4. Compliance & Assurance

4.1 Active Certifications

Certification Scope Verification
SOC 2 Type 2 Security, Availability, Confidentiality Available on request
GDPR Full compliance Policy
EU-U.S. DPF Data transfers Certificate
UK Extension DPF UK transfers Certificate
Swiss-U.S. DPF Swiss transfers Certificate

4.2 Third-Party Validation

4.3 Contractual Commitments

5. Operational Security

5.1 Development Security

→ See development practices at Security Policy: Internal Security Measures

5.2 Employee Security

→ See employee security requirements at Security Policy: Internal Security Measures

5.3 Vendor Management

→ See vendor management procedures at Security Policy: Vendor Management

5.4 Business Continuity

→ See business continuity details at Security Policy: Data Protection

5.5 Security Governance

→ See governance structure at Security Policy: Security Governance

Contact Us

For Immediate Needs

For Procurement & Compliance

This document provides a high-level overview of Vistaly's security and privacy practices for customer evaluation. For detailed technical specifications, please refer to the linked policies or contact our security team.

Vistaly Logo

A single workspace for connecting strategy, discovery, and delivery –– visually

©2025 Vistaly, Inc.