Security at Glancer

How we protect your data

At Glancer.ai, security is foundational to everything we build. We understand that you're trusting us with your business data, and we take that responsibility seriously. This page outlines the measures we take to protect your information.

Data Encryption

In Transit

All data transmitted between your browser and Glancer.ai is encrypted using TLS 1.2 or higher. This includes your authentication credentials, queries, and any data from your connected sources.

At Rest

Data stored on our servers is encrypted using AES-256 encryption. Database backups are also encrypted and stored securely.

Authentication & Access Control

  • Google OAuth: We use Google's secure OAuth 2.0 protocol for authentication. We never see or store your Google password.
  • Minimal Permissions: We request only the Google permissions necessary to provide the Service. You can review and revoke these permissions at any time through your Google Account settings.
  • Session Management: Sessions are secured with encrypted tokens and automatic expiration. Inactive sessions are terminated to reduce risk.

Infrastructure Security

Glancer.ai is hosted on enterprise-grade cloud infrastructure with the following security features:

  • SOC 2 Type II certified data centers
  • Network firewalls and intrusion detection systems
  • DDoS protection
  • Regular security patches and updates
  • Isolated computing environments

Data Handling Practices

  • Temporary Processing: When you connect a Google Sheet or upload a CSV, we process your data in memory to generate insights. We do not permanently store raw data from your sources unless you explicitly save a report.
  • No Data Selling: We never sell your data to third parties. Period.
  • AI Processing: Data sent to AI services for analysis is transmitted securely and is not used to train AI models or shared with other users.
  • Data Isolation: Each user's data is logically isolated. Users cannot access other users' data.

Employee Access

Access to production systems and customer data is strictly limited to authorized personnel who require it for their job functions. All access is logged and audited. Employees undergo security training and are bound by confidentiality agreements.

Incident Response

We maintain an incident response plan to quickly address any security events. In the unlikely event of a data breach affecting your information, we will notify you promptly in accordance with applicable laws.

Your Security Controls

You can take the following actions to manage your data security:

  • Disconnect data sources at any time through your account settings
  • Revoke Glancer's Google permissions through your Google Account
  • Delete your account and all associated data
  • Request a copy of your data

Security Summary

Security MeasureImplementation
Encryption in TransitTLS 1.2+
Encryption at RestAES-256
AuthenticationGoogle OAuth 2.0
InfrastructureSOC 2 certified cloud hosting
Data SalesNever

Questions?

If you have security questions or concerns, or to report a security vulnerability, please contact us at:

We take all security reports seriously and will respond promptly.