This Security Practices page describes the administrative, technical and physical controls applicable to Zite. If you have additional questions regarding security, please contact security@fillout.com and we will respond as soon as possible. Fillout (by Zite) is designed for intaking data securely. We follow industry best practices to keep your responses secure and areDocumentation Index
Fetch the complete documentation index at: https://zite.com/llms.txt
Use this file to discover all available pages before exploring further.
SOC 2 Type 2 compliant. This certification verifies that Zite meets rigorous standards for security, availability, and confidentiality in our data handling and processing systems.
Data we collect and store
See our privacy policy.Infrastructure and network security
Security is a non-negotiable priority at Zite. We take the following measures to keep your data and account secure. Hosting Zite is hosted on Amazon Web Services (AWS, via Render.com) and our AWS/Render servers are located in the United States and in the European Union (EU). EU servers are only used if requested by the customer. AWS data centers have state-of-the-art physical access controls, logical access controls, and frequent third-party independent audits. AWS has published a detailed security whitepaper outlining these measures. Zite employees have as-needed access to infrastructure on Render. All employees have dedicated user accounts and access infrastructure via two-factor authentication. Encryption Alldata in transit is encrypted over HTTPS/TLS between you and Zite’s servers. All data is encrypted at rest and replicated for durability.