Data Privacy
How TigerIdentity collects, processes, and protects your data
Privacy Commitment
TigerIdentity is committed to protecting the privacy and security of your data. We process only the data necessary to provide identity and access management services, and we give you full control over your data.
Core Principles
- •Data Minimization: We collect only what's needed for access control
- •Purpose Limitation: Data used solely for identity and access management
- •Transparency: Clear documentation of what we collect and why
- •User Control: Export, correct, or delete your data at any time
- •Security by Design: Encryption, access controls, and monitoring
Data Classification
We classify data by sensitivity and apply appropriate security controls to each category.
Authentication Credentials
API keys, OAuth tokens, service account secrets
- • Encrypted with customer-managed keys (CMK)
- • Stored in dedicated secrets management system (Vault)
- • Access logged and monitored
- • Automatic rotation policies enforced
Personal Identifiable Information (PII)
Names, email addresses, employee IDs, phone numbers
- • Encrypted at rest (AES-256) and in transit (TLS 1.3)
- • Row-level security and tenant isolation
- • Access requires authentication and authorization
- • Subject to data subject rights (export, delete)
Identity Attributes
Department, role, job title, manager, location
- • Encrypted at rest
- • Used for access policy evaluation
- • Synchronized from authoritative sources (HR, IdP)
- • Retained per data retention policy
Metadata & Telemetry
Timestamps, request IDs, feature usage, performance metrics
- • Aggregated and anonymized where possible
- • Used for service improvement and debugging
- • Retained for operational purposes (90 days)
Data Residency
Choose where your data is stored to meet data sovereignty and compliance requirements.
United States
us-east-1, us-west-2
European Union
eu-central-1, eu-west-1
Australia
ap-southeast-2
Configuring Data Residency
# Set during tenant provisioning
POST /v1/tenants
{
"name": "Acme Corp",
"data_residency": {
"primary_region": "eu-central-1",
"backup_region": "eu-west-1",
"allow_cross_region": false # Prevent data from leaving EU
}
}Cross-Region Restrictions
When allow_cross_region: false, all data processing, backups, and disaster recovery stay within your specified region. Audit logs and support access are also region-locked.
Data Processing
TigerIdentity processes identity data for the following purposes:
Access Control & Authorization
Evaluate access requests against policies to determine if a principal should be granted access to a resource.
Identity Synchronization
Pull identity data from source systems (LDAP, SCIM, HR systems) to maintain up-to-date identity graph.
Audit & Compliance
Log all access decisions and administrative actions for security investigations and compliance reporting.
Service Improvement
Analyze anonymized usage patterns to improve performance, detect anomalies, and develop new features.
Data Retention
We retain data only as long as necessary for business and compliance purposes.
# Default retention periods (configurable per tenant)
retention_policies:
identity_data:
active_principals: "while employed + 30 days"
deprovisioned_principals: "90 days"
audit_logs:
hot_storage: "90 days"
warm_storage: "1 year"
cold_archive: "7 years"
session_data:
active_sessions: "while valid + 24 hours"
expired_sessions: "30 days"
policy_versions:
all_versions: "indefinite (for rollback)"
backups:
daily: "30 days"
weekly: "90 days"
monthly: "1 year"Custom Retention
Enterprise customers can configure custom retention periods to meet specific compliance requirements (e.g., longer audit log retention for financial services).
Right to Deletion
In accordance with GDPR Article 17 and other privacy regulations, you can request deletion of personal data.
Deletion Process
Request Deletion
Submit request via API or contact support
Verification
We verify your identity and authority to request deletion
Data Removal
Identity and PII deleted from primary systems within 7 days
Pseudonymization
Audit logs pseudonymized (identifiers replaced with random IDs)
Backup Purge
Data removed from backups within 30 days
Confirmation
Deletion certificate issued
API Example
DELETE /v1/principals/{principal_id}
X-GDPR-Request: erasure
X-Requester-Email: [email protected]
# Response
{
"status": "scheduled",
"deletion_id": "del_abc123",
"stages": {
"primary_data": {
"status": "pending",
"estimated_completion": "2026-02-12T00:00:00Z"
},
"audit_logs": {
"status": "pending",
"action": "pseudonymize"
},
"backups": {
"status": "pending",
"estimated_completion": "2026-03-07T00:00:00Z"
}
}
}Exceptions
We may retain certain data when legally required:
- • Active legal hold or investigation
- • Regulatory retention requirements (e.g., 7 years for financial records)
- • Fraud prevention and security purposes
Sub-processors
TigerIdentity uses the following trusted third parties to provide infrastructure and services:
| Sub-processor | Purpose | Data Location |
|---|---|---|
| Amazon Web Services (AWS) | Cloud infrastructure, compute, storage | US, EU, AU (customer choice) |
| Google Cloud Platform (GCP) | Container registry, monitoring | US, EU |
| Datadog | Application monitoring, logging | US |
| PagerDuty | Incident response, on-call | US |
| SendGrid | Transactional email | US |
All sub-processors are contractually bound to GDPR-compliant data processing terms. We notify customers 30 days before adding new sub-processors.
Data Processing Agreement (DPA)
Our standard DPA covers GDPR requirements for customers in the EU. It includes:
Standard Contractual Clauses (SCCs)
For data transfers outside the EEA
Processing Instructions
Clear scope and purpose of processing
Security Measures
Technical and organizational controls
Data Subject Rights
Assistance with access, deletion requests
The DPA is incorporated by reference into our Terms of Service. Enterprise customers can execute a separate DPA if required.
Download DPA →Data Protection Officer
For privacy inquiries, data subject requests, or security concerns: