Tel: +358 40 7683813
Email: maria.sundstrom@liid.com
1. Introduction
Salestrail is a mobile-driven solution and call analytics dashboard designed to track and record mobile, WhatsApp, and WhatsApp Business calls. This document outlines Salestrail’s security measures, data handling practices, and overall approach to maintaining customer data privacy and confidentiality.
2. Application & Service Overview
Application Name: Salestrail
Components:
Salestrail App (iOS and Android)
Salestrail Recorder APK (for Android devices without native call recording)
Call Analytics Dashboard (web application)
Functionality:
Tracks and records mobile calls, WhatsApp, and WhatsApp Business calls.
Displays call analytics in the Salestrail dashboard.
Integrates with a CRM via prebuilt integrations or via API.
3. Architecture & Technology Stack
Frontend (Mobile)
React Native (JavaScript) for cross-platform development
Java for Android-specific code
Swift for iOS-specific code
Backend
Hosted on Microsoft Azure and orchestrated with Kubernetes
Built with Spring (Java/Kotlin)
Data stored in MySQL
Cloud Environment
Microsoft Azure (North Europe region, physically in Ireland)
4. Deployment & Hosting
Deployment Model:
Mobile App runs on the user’s phone.
Backend services run on Microsoft Azure Kubernetes Services.
On-Premise Availability:
The solution is not offered as an on-premise or hybrid deployment; it is fully cloud-based.
5. Data Flow & Storage
Data Flow Diagram
User’s Mobile Device (App)
Encrypted transmission (HTTPS) to Spring Boot backend on Kubernetes in Azure
Data stored securely in a MySQL database
If CRM integration is enabled, data is sent (over HTTPS) to the CRM or an API endpoint
Data at Rest
MySQL databases and backups in Microsoft Azure are encrypted at rest.
Call recordings stored in Azure Blob Storage, also encrypted at rest.
API tokens (JWT) are signed and verified using a secure key.
Data in Transit
All connections use HTTPS/SSL to encrypt data transfers.
6. Data Classification & Required Customer Data
Customer Data Collected:
Name, Company, Title, Email address, Phone number, Address, and other contact details
Call details (mobile calls, WhatsApp calls)
Data Classification Policy:
You can order the data classification policy from support@liid.com
7. Privacy & Regulatory Compliance
General Compliance
We strive to align with industry standards
We have not pursued formal certifications due to our size but uphold best practices where possible.
Data Protection & GDPR
Personal data remains the property of the Controller (our customers).
We process data only as directed by the Controller and comply with data subject requests.
No onward transfers outside the EEA without explicit permission.
CCPA
We do not sell personal information.
Consumers have the right to request access, deletion, and to opt out of any sale of data.
Data Subject Rights
Copy of personal information: Provided within 45 days upon request (via email or other channels).
Deletion of personal information: Performed free of charge upon verified request.
8. Access Control & Roles
Internal (Employee) Access
Only full-time staff with a legitimate business need (e.g., development, support) can access sensitive data.
Customer Support staff can see usernames and email addresses to assist with support requests.
Customer (Dashboard) Roles
Owner: Full access, can manage teams and see all data.
Manager: Can create teams and users but only sees data if assigned as a Team Admin.
User: Only sees own data; cannot add/remove others or create teams.
Team Admin: Monitors the call data of team members in specific teams.
9. Authentication & Password Policies
Employee Authentication
MFA is required to access production systems.
Password Policy includes at least 9 characters, complexity rules, hashing with bcrypt.
Antivirus/anti-malware is installed on corporate devices.
Customer Authentication
Users log in via a One-Time Password (OTP) sent by email.
A key derived from the OTP is stored securely on the device and hashed with bcrypt in the cloud.
Future requests use JWT tokens with limited validity.
10. Security Policies & Procedures
Information Security Policies
Clean Desk Policy
Email Policy
Password Construction Guidelines
Password Protection Policy
Incident Response & Breach Notification
We maintain a Security Incident Response Plan (attached).
Data breaches are reported to impacted customers immediately (or within 72 hours).
Response steps: triage, containment, communication, eradication, recovery.
Employee Training
Regular security awareness training (annually).
All personnel sign confidentiality agreements.
Sanctions Policy
There is no formal disciplinary policy documented, but any security policy breach is addressed as needed.
11. Audits & Testing
Internal Audits
Conducted annually using tools such as automated URL injectors, static analysis, code dependency checks, etc.
External Audits
No current independent third-party penetration testing or code reviews.
Historically, one external verification was done related to a Google Mail integration.
Network & Application Vulnerability Management
Regular scanning for vulnerabilities, with critical patches applied immediately.
Updates are performed at least annually, more frequently for urgent patches (e.g., Log4j).
12. Infrastructure Security
Hosting Environment
Microsoft Azure, using Kubernetes to orchestrate containers.
Strict firewall policies, WAF enabled, unused ports blocked.
Backups
Database Backups automatically created in Azure, encrypted at rest.
Point-in-time recovery is available.
Endpoint Security
Corporate laptops include anti-malware; employees have admin privileges.
No VPN used; firewall allows IP-based access for remote work.
Change Management
Network changes are administered by a main admin. Developers do not have direct access to production network configurations.
13. Physical Security
Office Location: Helsinki, Finland (Fredrikinkatu 33a, 00120 Helsinki)
Office Setup: Not a shared office space. Access control in place.
Data Center: Microsoft Azure’s secure data centers in Ireland / North Europe region.
Business Continuity: Physical and environmental risks are assessed annually. There is a continuity plan in place if offices are inaccessible.
14. Incident Response & Notification
Security Event Logging & Detection
Azure provides login event alerting; application logs are maintained for user login attempts and API calls.
Data Breach Process
Customers are notified without undue delay (within 72 hours) if a breach is discovered that impacts them.
Responsibility
Information Security Officer: Risto Linnoskivi (reports to CEO, coordinates incidents).
15. Data Retention & Disposal
Retention Period
Typically 3 years after contract termination unless otherwise requested.
Data Deletion
Upon a verified request, all user and call data (including recordings, tokens, and integration data) are permanently deleted from the Azure environment.
Deletion is cascaded to any sub-processors.
16. Contact & Additional Information
Key Security Contacts:
Information Security Officer:
Risto Linnoskivi, risto.linnoskivi@liid.com
CEO:
Maria Sundström
Privacy & DPO
DPO contact details are available to clients upon request.
Privacy Notice / Privacy Policy: Salestrail Legal
Further Documentation
Security Program Management & Incident Response Plan
Information Classification and Handling Policy
Clean Desk Policy
Password Guidelines
Other attachments as referenced in this document
17. Summary
Salestrail is committed to securing your data through robust authentication, encryption at rest and in transit, and well-defined incident response processes. Our entire cloud deployment runs in Microsoft Azure, leveraging its proven security features. Regular internal reviews help us continuously improve. While we do not hold formal security certifications, we follow best practices in line with recognized frameworks.
For any questions regarding this document or to request additional information, please contact:
Security Officer: Risto Linnoskivi (risto.linnoskivi@liid.com)
CEO: Maria Sundström (maria.sundstrom@liid.com)
Tel: +358 40 7683813
This document is provided as a high-level overview of Salestrail’s security posture. It is subject to change as our infrastructure and processes evolve.