Skip to main content
All CollectionsData, Security and Legal
Security & Data Privacy Document
Security & Data Privacy Document
Yvonne Pulkkinen avatar
Written by Yvonne Pulkkinen
Updated this week

Tel: +358 40 7683813

1. Introduction

Salestrail is a mobile-driven solution and call analytics dashboard designed to track and record mobile, WhatsApp, and WhatsApp Business calls. This document outlines Salestrail’s security measures, data handling practices, and overall approach to maintaining customer data privacy and confidentiality.


2. Application & Service Overview

  • Application Name: Salestrail

  • Components:

    • Salestrail App (iOS and Android)

    • Salestrail Recorder APK (for Android devices without native call recording)

    • Call Analytics Dashboard (web application)

  • Functionality:

    • Tracks and records mobile calls, WhatsApp, and WhatsApp Business calls.

    • Displays call analytics in the Salestrail dashboard.

    • Integrates with a CRM via prebuilt integrations or via API.


3. Architecture & Technology Stack

  • Frontend (Mobile)

    • React Native (JavaScript) for cross-platform development

    • Java for Android-specific code

    • Swift for iOS-specific code

  • Backend

    • Hosted on Microsoft Azure and orchestrated with Kubernetes

    • Built with Spring (Java/Kotlin)

    • Data stored in MySQL

  • Cloud Environment

    • Microsoft Azure (North Europe region, physically in Ireland)


4. Deployment & Hosting

  • Deployment Model:

    • Mobile App runs on the user’s phone.

    • Backend services run on Microsoft Azure Kubernetes Services.

  • On-Premise Availability:

    • The solution is not offered as an on-premise or hybrid deployment; it is fully cloud-based.


5. Data Flow & Storage

  1. Data Flow Diagram

    • User’s Mobile Device (App)

    • Encrypted transmission (HTTPS) to Spring Boot backend on Kubernetes in Azure

    • Data stored securely in a MySQL database

    • If CRM integration is enabled, data is sent (over HTTPS) to the CRM or an API endpoint

  2. Data at Rest

    • MySQL databases and backups in Microsoft Azure are encrypted at rest.

    • Call recordings stored in Azure Blob Storage, also encrypted at rest.

    • API tokens (JWT) are signed and verified using a secure key.

  3. Data in Transit

    • All connections use HTTPS/SSL to encrypt data transfers.


6. Data Classification & Required Customer Data

  • Customer Data Collected:

    • Name, Company, Title, Email address, Phone number, Address, and other contact details

    • Call details (mobile calls, WhatsApp calls)

  • Data Classification Policy:


7. Privacy & Regulatory Compliance

  1. General Compliance

    • We strive to align with industry standards

    • We have not pursued formal certifications due to our size but uphold best practices where possible.

  2. Data Protection & GDPR

    • Personal data remains the property of the Controller (our customers).

    • We process data only as directed by the Controller and comply with data subject requests.

    • No onward transfers outside the EEA without explicit permission.

  3. CCPA

    • We do not sell personal information.

    • Consumers have the right to request access, deletion, and to opt out of any sale of data.

  4. Data Subject Rights

    • Copy of personal information: Provided within 45 days upon request (via email or other channels).

    • Deletion of personal information: Performed free of charge upon verified request.


8. Access Control & Roles

  1. Internal (Employee) Access

    • Only full-time staff with a legitimate business need (e.g., development, support) can access sensitive data.

    • Customer Support staff can see usernames and email addresses to assist with support requests.

  2. Customer (Dashboard) Roles

    • Owner: Full access, can manage teams and see all data.

    • Manager: Can create teams and users but only sees data if assigned as a Team Admin.

    • User: Only sees own data; cannot add/remove others or create teams.

    • Team Admin: Monitors the call data of team members in specific teams.


9. Authentication & Password Policies

  1. Employee Authentication

    • MFA is required to access production systems.

    • Password Policy includes at least 9 characters, complexity rules, hashing with bcrypt.

    • Antivirus/anti-malware is installed on corporate devices.

  2. Customer Authentication

    • Users log in via a One-Time Password (OTP) sent by email.

    • A key derived from the OTP is stored securely on the device and hashed with bcrypt in the cloud.

    • Future requests use JWT tokens with limited validity.


10. Security Policies & Procedures

  1. Information Security Policies

    • Clean Desk Policy

    • Email Policy

    • Password Construction Guidelines

    • Password Protection Policy

  2. Incident Response & Breach Notification

    • We maintain a Security Incident Response Plan (attached).

    • Data breaches are reported to impacted customers immediately (or within 72 hours).

    • Response steps: triage, containment, communication, eradication, recovery.

  3. Employee Training

    • Regular security awareness training (annually).

    • All personnel sign confidentiality agreements.

  4. Sanctions Policy

    • There is no formal disciplinary policy documented, but any security policy breach is addressed as needed.


11. Audits & Testing

  1. Internal Audits

    • Conducted annually using tools such as automated URL injectors, static analysis, code dependency checks, etc.

  2. External Audits

    • No current independent third-party penetration testing or code reviews.

    • Historically, one external verification was done related to a Google Mail integration.

  3. Network & Application Vulnerability Management

    • Regular scanning for vulnerabilities, with critical patches applied immediately.

    • Updates are performed at least annually, more frequently for urgent patches (e.g., Log4j).


12. Infrastructure Security

  1. Hosting Environment

    • Microsoft Azure, using Kubernetes to orchestrate containers.

    • Strict firewall policies, WAF enabled, unused ports blocked.

  2. Backups

    • Database Backups automatically created in Azure, encrypted at rest.

    • Point-in-time recovery is available.

  3. Endpoint Security

    • Corporate laptops include anti-malware; employees have admin privileges.

    • No VPN used; firewall allows IP-based access for remote work.

  4. Change Management

    • Network changes are administered by a main admin. Developers do not have direct access to production network configurations.


13. Physical Security

  • Office Location: Helsinki, Finland (Fredrikinkatu 33a, 00120 Helsinki)

  • Office Setup: Not a shared office space. Access control in place.

  • Data Center: Microsoft Azure’s secure data centers in Ireland / North Europe region.

  • Business Continuity: Physical and environmental risks are assessed annually. There is a continuity plan in place if offices are inaccessible.


14. Incident Response & Notification

  • Security Event Logging & Detection

    • Azure provides login event alerting; application logs are maintained for user login attempts and API calls.

  • Data Breach Process

    • Customers are notified without undue delay (within 72 hours) if a breach is discovered that impacts them.

  • Responsibility

    • Information Security Officer: Risto Linnoskivi (reports to CEO, coordinates incidents).


15. Data Retention & Disposal

  • Retention Period

    • Typically 3 years after contract termination unless otherwise requested.

  • Data Deletion

    • Upon a verified request, all user and call data (including recordings, tokens, and integration data) are permanently deleted from the Azure environment.

    • Deletion is cascaded to any sub-processors.


16. Contact & Additional Information

  • Key Security Contacts:

  • Privacy & DPO

    • DPO contact details are available to clients upon request.

    • Privacy Notice / Privacy Policy: Salestrail Legal

  • Further Documentation

    • Security Program Management & Incident Response Plan

    • Information Classification and Handling Policy

    • Clean Desk Policy

    • Password Guidelines

    • Other attachments as referenced in this document


17. Summary

Salestrail is committed to securing your data through robust authentication, encryption at rest and in transit, and well-defined incident response processes. Our entire cloud deployment runs in Microsoft Azure, leveraging its proven security features. Regular internal reviews help us continuously improve. While we do not hold formal security certifications, we follow best practices in line with recognized frameworks.

For any questions regarding this document or to request additional information, please contact:

Tel: +358 40 7683813


This document is provided as a high-level overview of Salestrail’s security posture. It is subject to change as our infrastructure and processes evolve.

Did this answer your question?