Documentation

Data Privacy

How TigerIdentity collects, processes, and protects your data

Privacy Commitment

TigerIdentity is committed to protecting the privacy and security of your data. We process only the data necessary to provide identity and access management services, and we give you full control over your data.

Core Principles

  • Data Minimization: We collect only what's needed for access control
  • Purpose Limitation: Data used solely for identity and access management
  • Transparency: Clear documentation of what we collect and why
  • User Control: Export, correct, or delete your data at any time
  • Security by Design: Encryption, access controls, and monitoring

Data Classification

We classify data by sensitivity and apply appropriate security controls to each category.

CRITICAL

Authentication Credentials

API keys, OAuth tokens, service account secrets

  • • Encrypted with customer-managed keys (CMK)
  • • Stored in dedicated secrets management system (Vault)
  • • Access logged and monitored
  • • Automatic rotation policies enforced
HIGH

Personal Identifiable Information (PII)

Names, email addresses, employee IDs, phone numbers

  • • Encrypted at rest (AES-256) and in transit (TLS 1.3)
  • • Row-level security and tenant isolation
  • • Access requires authentication and authorization
  • • Subject to data subject rights (export, delete)
MEDIUM

Identity Attributes

Department, role, job title, manager, location

  • • Encrypted at rest
  • • Used for access policy evaluation
  • • Synchronized from authoritative sources (HR, IdP)
  • • Retained per data retention policy
LOW

Metadata & Telemetry

Timestamps, request IDs, feature usage, performance metrics

  • • Aggregated and anonymized where possible
  • • Used for service improvement and debugging
  • • Retained for operational purposes (90 days)

Data Residency

Choose where your data is stored to meet data sovereignty and compliance requirements.

🇺🇸

United States

us-east-1, us-west-2

🇪🇺

European Union

eu-central-1, eu-west-1

🇦🇺

Australia

ap-southeast-2

Configuring Data Residency

# Set during tenant provisioning
POST /v1/tenants
{
  "name": "Acme Corp",
  "data_residency": {
    "primary_region": "eu-central-1",
    "backup_region": "eu-west-1",
    "allow_cross_region": false  # Prevent data from leaving EU
  }
}

Cross-Region Restrictions

When allow_cross_region: false, all data processing, backups, and disaster recovery stay within your specified region. Audit logs and support access are also region-locked.

Data Processing

TigerIdentity processes identity data for the following purposes:

Access Control & Authorization

Evaluate access requests against policies to determine if a principal should be granted access to a resource.

Data Used:
Principal attributes (role, department, clearance), resource attributes (sensitivity, environment), context (IP, time, device trust)

Identity Synchronization

Pull identity data from source systems (LDAP, SCIM, HR systems) to maintain up-to-date identity graph.

Data Used:
User profiles, group memberships, organizational structure, employment status

Audit & Compliance

Log all access decisions and administrative actions for security investigations and compliance reporting.

Data Used:
Access decision context, policy evaluation results, timestamps, IP addresses

Service Improvement

Analyze anonymized usage patterns to improve performance, detect anomalies, and develop new features.

Data Used:
Aggregated metrics, performance telemetry (anonymized), error rates

Data Retention

We retain data only as long as necessary for business and compliance purposes.

# Default retention periods (configurable per tenant)
retention_policies:
  identity_data:
    active_principals: "while employed + 30 days"
    deprovisioned_principals: "90 days"

  audit_logs:
    hot_storage: "90 days"
    warm_storage: "1 year"
    cold_archive: "7 years"

  session_data:
    active_sessions: "while valid + 24 hours"
    expired_sessions: "30 days"

  policy_versions:
    all_versions: "indefinite (for rollback)"

  backups:
    daily: "30 days"
    weekly: "90 days"
    monthly: "1 year"

Custom Retention

Enterprise customers can configure custom retention periods to meet specific compliance requirements (e.g., longer audit log retention for financial services).

Right to Deletion

In accordance with GDPR Article 17 and other privacy regulations, you can request deletion of personal data.

Deletion Process

1

Request Deletion

Submit request via API or contact support

2

Verification

We verify your identity and authority to request deletion

3

Data Removal

Identity and PII deleted from primary systems within 7 days

4

Pseudonymization

Audit logs pseudonymized (identifiers replaced with random IDs)

5

Backup Purge

Data removed from backups within 30 days

6

Confirmation

Deletion certificate issued

API Example

DELETE /v1/principals/{principal_id}
X-GDPR-Request: erasure
X-Requester-Email: [email protected]

# Response
{
  "status": "scheduled",
  "deletion_id": "del_abc123",
  "stages": {
    "primary_data": {
      "status": "pending",
      "estimated_completion": "2026-02-12T00:00:00Z"
    },
    "audit_logs": {
      "status": "pending",
      "action": "pseudonymize"
    },
    "backups": {
      "status": "pending",
      "estimated_completion": "2026-03-07T00:00:00Z"
    }
  }
}

Exceptions

We may retain certain data when legally required:

  • • Active legal hold or investigation
  • • Regulatory retention requirements (e.g., 7 years for financial records)
  • • Fraud prevention and security purposes

Sub-processors

TigerIdentity uses the following trusted third parties to provide infrastructure and services:

Sub-processorPurposeData Location
Amazon Web Services (AWS)Cloud infrastructure, compute, storageUS, EU, AU (customer choice)
Google Cloud Platform (GCP)Container registry, monitoringUS, EU
DatadogApplication monitoring, loggingUS
PagerDutyIncident response, on-callUS
SendGridTransactional emailUS

All sub-processors are contractually bound to GDPR-compliant data processing terms. We notify customers 30 days before adding new sub-processors.

Data Processing Agreement (DPA)

Our standard DPA covers GDPR requirements for customers in the EU. It includes:

Standard Contractual Clauses (SCCs)

For data transfers outside the EEA

Processing Instructions

Clear scope and purpose of processing

Security Measures

Technical and organizational controls

Data Subject Rights

Assistance with access, deletion requests

The DPA is incorporated by reference into our Terms of Service. Enterprise customers can execute a separate DPA if required.

Download DPA →

Data Protection Officer

For privacy inquiries, data subject requests, or security concerns:

Address: TigerIdentity, Inc., 123 Privacy Lane, San Francisco, CA 94102

Privacy Questions?

Our privacy team is here to help