No results were found...

MailerLite Trust Page

How MailerLite keeps your data safe and sound

MailerLite is built to be your partner in secure growth. We provide robust data protection by design, giving you the freedom to innovate and achieve ambitious goals that serve your business.

Here’s a look at why you can trust MailerLite to protect your business.

We have a strong Information Security Policy

MailerLite has implemented and continually improves Information Security Management System (ISMS) to ensure proper information protection, manage risks and ensure business continuity following the requirements of the ISO/IEC 27001:2022 standard. 

ISMS is aligned with the needs and expectations of the clients and other stakeholders. MailerLite commits to satisfying applicable requirements related to information security and data privacy.

Information security and data privacy is an important integral part of our corporate governance. We are committed to continually improving our ISMS system by setting ambitious information security goals and objectives in these key areas: compliance, risk appetite and capacity, incident detection and resolution.

We continually develop tools to be GDPR compliant

The MailerLite team continues developing new features that help us stay GDPR-compliant. We have incorporated all the necessary controls and procedures for personal data processing security derived from the GDPR into our systems. You can find more information about the data we collect and how we process it in our Privacy Policy and Data Processing Addendum.

We’re certified to global security and privacy standards

Information security

MailerLite is certified to ISO/IEC 27001:2022, the leading standard for Information Security Management Systems (ISMS). This certification reflects our commitment to the highest levels of data security, ensuring the confidentiality and integrity of our customers' and employees’ information. 

Payment security

Passwords and credit card information are always sent over secure, encrypted Secure Sockets Layer (SSL) connections. All payment information provided to MailerLite is passed directly to its payment processors, and MailerLite does not have access to it. Our payment processing vendors are Payment Card Industry Data Security Standard (PCI-DSS) compliant.

Data privacy frameworks

MailerLite, Inc., providing services to the customers outside of the European Economic Area (EEA), United Kingdom, and Switzerland, holds the certification developed by the U.S. Department of Commerce and the European Commission, UK Government, and Swiss Federal Administration affirming its adherence to the Data Privacy Framework principles to ensure the secure collection, processing, utilization, and retention of personal data transfers from these regions to the US. To be specific, MailerLite, Inc. complies with the EU-U.S. and Swiss-U.S. Data Privacy Frameworks (DPF), including the UK Extension to the EU-U.S. DPF. For further information, please visit the DPF website here and MailerLite’s Privacy Policy here.

We prioritize infrastructure and network security

Data center security

Our services are hosted by trusted and certified data storage centers that are located in the European Union (Germany and the Netherlands) and are certified to ISO/IEC 27001:2022. You can rest assured that your and your subscribers’ data is safe with us because our data center provides all the necessary security measures for data protection and processing.

Network security

We employ multiple layers of network security. Our infrastructure is protected by firewalls. All network traffic is monitored for suspicious activity.

Cloud Security Posture Management (CSPM)

We monitor our cloud environment through a multi-layered approach to ensure security and compliance. This involves continuous automated scanning for misconfigurations, real-time threat detection using advanced security analytics, and regular audits against industry standards.

We encrypt data communications and minimize retention

Data encryption

Data communications between the client and our application are protected via encrypted data channels using the HTTPS/TLS (Hypertext Transfer Protocol Secure/Transport Layer Security) protocol. Data integrity is ensured by mirroring all data in two separate locations.

Data retention

We are committed to data minimization and retain your data only for as long as it is necessary. We keep your account information while your account is active to provide our services, and other data, like financial records, for specific periods to comply with legal obligations. All data is securely deleted after it is no longer needed. You can find more detailed information in our Privacy Policy.

We take application and product security seriously

Secure Software Development Lifecycle (SDLC)

We follow secure coding best practices throughout the development lifecycle. This includes security requirements in the design phase, peer code reviews, and automated security testing integrated into our CI/CD pipeline.

Vulnerability management

We regularly scan our applications and infrastructure for vulnerabilities using industry-leading tools. Identified vulnerabilities are tracked, prioritized, and remediated based on severity.

Penetration testing

We engage independent, third-party security firms to conduct regular penetration tests of our applications and infrastructure to identify and address potential security weaknesses.

Single Sign-On (SSO)

We use a top-tier Single Sign-On (SSO) solution to centralize authentication across all our tools, providing a unified and secure access point. This approach strengthens our security through enforced two-factor authentication (2FA) and reduces the risk of password-related issues for team members. It also improves efficiency for our IT and security teams by making it easier to manage user accounts, including automatic provisioning and the deactivation of unused accounts.

We monitor everything and have a clear plan for response

Monitoring and logging

We maintain a centralized logging and monitoring system that collects events from across our infrastructure and applications. This allows us to detect, investigate, and respond to potential security incidents in real-time.

Remediation

We have a formal incident response plan that outlines the procedures for containing, investigating, and remediating security incidents. The plan includes clear roles, responsibilities, and communication protocols.

We have strong corporate and organizational security

Information Security Management System (ISMS)

We have implemented and continually improved an Information Security Management System (ISMS) to ensure proper information protection, manage risks and ensure business continuity following the requirements of the ISO/IEC 27001:2022 standard. ISMS is aligned with the needs and expectations of the clients and other stakeholders.

Information security policies

We maintain a comprehensive set of information security policies and standards that are approved by management, published, and communicated to all team members and relevant external parties.

Risk management

Choosing the right security controls would be impossible without first understanding our unique risks. That's why at MailerLite, risk management drives our entire security program. By identifying potential threats and vulnerabilities and analyzing their likelihood and impact, we can make informed, data-driven decisions about which security controls to implement. This ensures our defenses are always proportional to the risks we face. The process is continuous, with regular updates to risk assessments and an annual review.

Internal audit

We believe it's crucial to confirm that our controls are performing as expected. Our annual and internal audit programs are designed not only to catch and fix problems quickly but also to proactively identify areas for continual enhancement. The outcomes of these audits are formally reported to senior leadership, ensuring they are integrated into our overall information security oversight.

Access control

Access to sensitive data and systems is strictly controlled based on the principle of least privilege. We enforce strong password policies, require multi-factor authentication (MFA) for all team members, and conduct regular access reviews.

Endpoint security

To protect company data, all of our corporate-managed devices are fully encrypted, rendering the data on them inaccessible if lost. Furthermore, every device is enrolled in our management platform, giving our management team central control. This allows us to enforce security policies and system updates, and critically, gives us the power to remotely disable or erase a device in the event of loss or a security breach.

Vendor risk management

We expect our vendors to uphold the same high standards of information security that we maintain internally—especially when they have access to customer data. To ensure this, we apply rigorous security requirements tailored to each vendor's risk level to our operations and customers.

Personnel onboarding

All new hires receive security and data privacy training during their initial onboarding process. This foundational step ensures every team member, regardless of their role, understands their personal responsibility in protecting company and customer data from day one.

Security awareness training

We cultivate a strong security culture through a continuous awareness program for all company team members. Our training features dynamic content specifically tailored to MailerLite's unique information security landscape. This ongoing education is reinforced with regular phishing and spear-phishing simulations to ensure our team’s vigilance against emerging threats.

Dedicated security team

We have dedicated personnel to manage and monitor all our services and infrastructure 24/7. Our team focuses on the network, system security and has incident management procedures.

We design reliable systems

Uptime and availability

Our systems are designed for high availability. We utilize the resilient infrastructure of Google Cloud Platform to minimize downtime and ensure our service is available when you need it. We have a publicly available status page.

Backup and recovery

We perform regular backups of all customer data. In the event of a disaster, we have a comprehensive recovery plan to restore service and data quickly and efficiently.

Unlock absolutely everything for 14 days for free

Go wild trying out all our features for a full 14 days—no credit card required to start a trial.