Publigo's Security Assessment

This article answers the question: " Can I trust Publigo with my Google data?" And the answer is Yes. Publigo undergoes a yearly mandatory security audit from Google empanelled security assessors. This assessment helps keep Publigo users’ (your) data safe by verifying that Publigo has the capability in handling data securely and in deleting user data upon user request.

In this article

Security Assessment (Annual Recertification)

Every app that requests access to restricted scope Google user’s data (e.g., access to your Google Drive to check if your campaign recipients have responded) and has the ability to access data from or through a third-party server (i.e., Publigo) is required to go through a security assessment from Google security assessors. 

This assessment helps keep Google users’ data safe by verifying that all apps that access Google user data (i.e., Publigo) demonstrate capability in handling data securely and deleting user data upon user request. 
In order to maintain access to restricted scopes, Publigo needs to undergo this security assessment on an annual basis, this process is called the Security Reassessment, also known as Annual Recertification.
Prominent security firms have rigorously audited Publigo, solidifying our unwavering commitment to top-notch and robust security standards: 

December 2023 - pwc.

Note: Letters of Validation(LoV) from our Penetration Testing partners (Google empanelled security assessors) are available upon request.
Email us at support@publigo.app to request for one.

What does the security assessment include?

The security assessment includes the following: 
  1. Architecture, Design and Threat Modeling
  2. Authentication Verification
  3. Session Management Verification
  4. Access Control Verification
  5. Validation, Sanitization and Encoding Verification
  6. Stored Cryptography Verification
  7. Error Handling and Logging Verification
  8. Data Protection Verification
  9. Communications Verification
  10. Malicious Code Verification
  11. Business Logic Verification
  12. File and Resources Verification
  13. API and Web Service Verification
  14. Configuration Verification

Please visit our User Account Deletion section under our Privacy Policy.

Still need help? Contact Us Contact Us