Security & Privacy

Security & Privacy

Last updated:

04.09.2025

Security

Qzila applies a security-by-design approach to protect your data. Our team continuously works on improvements so you can use Qzila with confidence.

Security

Qzila applies a security-by-design approach to protect your data. Our team continuously works on improvements so you can use Qzila with confidence.

Security

Qzila applies a security-by-design approach to protect your data. Our team continuously works on improvements so you can use Qzila with confidence.

Security infrastructure

Qzila’s infrastructure is designed with multiple layers of protection to keep your data safe while it is transmitted, stored, or processed. Protections include, but are not limited to: encryption, least privilege access, secure software development, and a public bug bounty program.

Security infrastructure

Qzila’s infrastructure is designed with multiple layers of protection to keep your data safe while it is transmitted, stored, or processed. Protections include, but are not limited to: encryption, least privilege access, secure software development, and a public bug bounty program.

Security infrastructure

Qzila’s infrastructure is designed with multiple layers of protection to keep your data safe while it is transmitted, stored, or processed. Protections include, but are not limited to: encryption, least privilege access, secure software development, and a public bug bounty program.

Operational security

Our information security team continuously implements new security measures and monitors Qzila for malicious activity across infrastructure, networks, and assets.

Operational security

Our information security team continuously implements new security measures and monitors Qzila for malicious activity across infrastructure, networks, and assets.

Operational security

Our information security team continuously implements new security measures and monitors Qzila for malicious activity across infrastructure, networks, and assets.

Bezpečnosť produktu

Asign poskytuje robustný súbor ochrán údajov v produkte a administračných nástrojov pre väčšiu kontrolu a prehľad nad údajmi. Enterprise administrátori môžu nasadiť Asign do svojej organizácie s SSO cez SAML 2.0, spravovať používateľov cez SCIM a sledovať aktivitu pomocou funkcií audit logu. Okrem toho môžu detailne nastaviť oprávnenia, hostí a správu tímov.

Bezpečnosť produktu

Asign poskytuje robustný súbor ochrán údajov v produkte a administračných nástrojov pre väčšiu kontrolu a prehľad nad údajmi. Enterprise administrátori môžu nasadiť Asign do svojej organizácie s SSO cez SAML 2.0, spravovať používateľov cez SCIM a sledovať aktivitu pomocou funkcií audit logu. Okrem toho môžu detailne nastaviť oprávnenia, hostí a správu tímov.

Product security

Qzila provides a robust set of in-product data protections and administrative tools for greater visibility and control over data. Enterprise administrators can deploy Qzila within their organization with SSO via SAML 2.0, manage users through SCIM, and track activity with audit log features. Additionally, they can fine-tune permission controls, manage guests, and organize teams.

Product security

Qzila provides a robust set of in-product data protections and administrative tools for greater visibility and control over data. Enterprise administrators can deploy Qzila within their organization with SSO via SAML 2.0, manage users through SCIM, and track activity with audit log features. Additionally, they can fine-tune permission controls, manage guests, and organize teams.

Privacy

Qzila maintains a comprehensive privacy compliance program and is committed to working with its customers and vendors to ensure adherence to privacy requirements. This page highlights some of the key aspects of our program.

Privacy

Qzila maintains a comprehensive privacy compliance program and is committed to working with its customers and vendors to ensure adherence to privacy requirements. This page highlights some of the key aspects of our program.

Privacy

Qzila maintains a comprehensive privacy compliance program and is committed to working with its customers and vendors to ensure adherence to privacy requirements. This page highlights some of the key aspects of our program.

How we handle your data

At Qzila, our team is dedicated to developing and implementing data privacy processes and safeguards that meet industry standards and best practices. We provide continuous training for our teams to keep them aligned with legislative developments and essential privacy and security practices. Every Qzila employee and contractor signs a confidentiality agreement to ensure the security and privacy of your data. Qzila also requires all vendors handling personal data to adhere to the same data management, security, and privacy standards we uphold ourselves.

How we handle your data

At Qzila, our team is dedicated to developing and implementing data privacy processes and safeguards that meet industry standards and best practices. We provide continuous training for our teams to keep them aligned with legislative developments and essential privacy and security practices. Every Qzila employee and contractor signs a confidentiality agreement to ensure the security and privacy of your data. Qzila also requires all vendors handling personal data to adhere to the same data management, security, and privacy standards we uphold ourselves.

How we handle your data

At Qzila, our team is dedicated to developing and implementing data privacy processes and safeguards that meet industry standards and best practices. We provide continuous training for our teams to keep them aligned with legislative developments and essential privacy and security practices. Every Qzila employee and contractor signs a confidentiality agreement to ensure the security and privacy of your data. Qzila also requires all vendors handling personal data to adhere to the same data management, security, and privacy standards we uphold ourselves.

Agreements

At Qzila, we strive to keep all of our agreements updated in line with the latest regulations and industry standards. Our Master Subscription Agreement and Data Processing Addendum describe in detail our data protection processes, standards, safeguards, and compliance with data protection legislation. To ensure our terms remain aligned with GDPR, CCPA, and other global privacy standards, they are regularly reviewed by leading privacy experts across multiple jurisdictions.

Agreements

At Qzila, we strive to keep all of our agreements updated in line with the latest regulations and industry standards. Our Master Subscription Agreement and Data Processing Addendum describe in detail our data protection processes, standards, safeguards, and compliance with data protection legislation. To ensure our terms remain aligned with GDPR, CCPA, and other global privacy standards, they are regularly reviewed by leading privacy experts across multiple jurisdictions.

Agreements

At Qzila, we strive to keep all of our agreements updated in line with the latest regulations and industry standards. Our Master Subscription Agreement and Data Processing Addendum describe in detail our data protection processes, standards, safeguards, and compliance with data protection legislation. To ensure our terms remain aligned with GDPR, CCPA, and other global privacy standards, they are regularly reviewed by leading privacy experts across multiple jurisdictions.

Policies

At Qzila, we aim to be as transparent as possible with our customers about how we collect, process, store, and use their personal data. To achieve this, Qzila maintains comprehensive and detailed policies that describe how we handle your personal information. These policies also explain in detail how our users can exercise their rights with respect to their data.

Policies

At Qzila, we aim to be as transparent as possible with our customers about how we collect, process, store, and use their personal data. To achieve this, Qzila maintains comprehensive and detailed policies that describe how we handle your personal information. These policies also explain in detail how our users can exercise their rights with respect to their data.

Policies

At Qzila, we aim to be as transparent as possible with our customers about how we collect, process, store, and use their personal data. To achieve this, Qzila maintains comprehensive and detailed policies that describe how we handle your personal information. These policies also explain in detail how our users can exercise their rights with respect to their data.

Data governance

Data governance refers to the policies and procedures that define how data is obtained and used throughout its entire lifecycle – from creation and collection to processing, distribution, storage, and deletion. Qzila’s commitment to data governance is essential to ensuring our users’ data remains secure, private, accurate, and accessible.

Data governance

Data governance refers to the policies and procedures that define how data is obtained and used throughout its entire lifecycle – from creation and collection to processing, distribution, storage, and deletion. Qzila’s commitment to data governance is essential to ensuring our users’ data remains secure, private, accurate, and accessible.

Data governance

Data governance refers to the policies and procedures that define how data is obtained and used throughout its entire lifecycle – from creation and collection to processing, distribution, storage, and deletion. Qzila’s commitment to data governance is essential to ensuring our users’ data remains secure, private, accurate, and accessible.

GDPR

The General Data Protection Regulation (GDPR) is a comprehensive data protection law governing the collection and use of personal data of EU residents, allowing individuals to exercise control over their data. Since GDPR is considered the most stringent global privacy standard, we have aligned our privacy program with GDPR and other global data protection regulations.

GDPR

The General Data Protection Regulation (GDPR) is a comprehensive data protection law governing the collection and use of personal data of EU residents, allowing individuals to exercise control over their data. Since GDPR is considered the most stringent global privacy standard, we have aligned our privacy program with GDPR and other global data protection regulations.

GDPR

The General Data Protection Regulation (GDPR) is a comprehensive data protection law governing the collection and use of personal data of EU residents, allowing individuals to exercise control over their data. Since GDPR is considered the most stringent global privacy standard, we have aligned our privacy program with GDPR and other global data protection regulations.

Compliance

Qzila maintains a comprehensive security and privacy program to provide advanced security features in our Enterprise plan, designed to protect your data in accordance with various regulatory and industry standards. Qzila has been audited by independent third parties.

Compliance

Qzila maintains a comprehensive security and privacy program to provide advanced security features in our Enterprise plan, designed to protect your data in accordance with various regulatory and industry standards. Qzila has been audited by independent third parties.

Compliance

Qzila maintains a comprehensive security and privacy program to provide advanced security features in our Enterprise plan, designed to protect your data in accordance with various regulatory and industry standards. Qzila has been audited by independent third parties.

DORA

The Digital Operational Resilience Act (effective from 2025) establishes rules for digital operational resilience for financial institutions in the EU. It imposes obligations for ICT risk management, resilience testing, incident reporting, and third-party service provider oversight.

DORA

The Digital Operational Resilience Act (effective from 2025) establishes rules for digital operational resilience for financial institutions in the EU. It imposes obligations for ICT risk management, resilience testing, incident reporting, and third-party service provider oversight.

DORA

The Digital Operational Resilience Act (effective from 2025) establishes rules for digital operational resilience for financial institutions in the EU. It imposes obligations for ICT risk management, resilience testing, incident reporting, and third-party service provider oversight.

NIS2

The NIS2 Directive expands the EU cybersecurity framework. It introduces obligations for "essential" and "important" entities (e.g., energy, transport, healthcare, digital services). Requirements include risk management, incident reporting, and penalties for non-compliance.

NIS2

The NIS2 Directive expands the EU cybersecurity framework. It introduces obligations for "essential" and "important" entities (e.g., energy, transport, healthcare, digital services). Requirements include risk management, incident reporting, and penalties for non-compliance.

NIS2

The NIS2 Directive expands the EU cybersecurity framework. It introduces obligations for "essential" and "important" entities (e.g., energy, transport, healthcare, digital services). Requirements include risk management, incident reporting, and penalties for non-compliance.

ISO 27001

ISO 27001 is an international standard that defines the requirements for establishing, maintaining, and continuously improving an Information Security Management System (ISMS). Qzila is certified under ISO 27001, demonstrating that our processes and technologies meet the highest standards in data protection and security risk management.

ISO 27001

ISO 27001 is an international standard that defines the requirements for establishing, maintaining, and continuously improving an Information Security Management System (ISMS). Qzila is certified under ISO 27001, demonstrating that our processes and technologies meet the highest standards in data protection and security risk management.

ISO 27001

ISO 27001 is an international standard that defines the requirements for establishing, maintaining, and continuously improving an Information Security Management System (ISMS). Qzila is certified under ISO 27001, demonstrating that our processes and technologies meet the highest standards in data protection and security risk management.

ZoKB č. 69/2018 Z. z.

The Cybersecurity Act (ZoKB 69/2018) is Slovak legislation that transposes the NIS directive into national law. It introduces obligations for operators of essential services and providers of digital services regarding cybersecurity.

ZoKB č. 69/2018 Z. z.

The Cybersecurity Act (ZoKB 69/2018) is Slovak legislation that transposes the NIS directive into national law. It introduces obligations for operators of essential services and providers of digital services regarding cybersecurity.

ZoKB č. 69/2018 Z. z.

The Cybersecurity Act (ZoKB 69/2018) is Slovak legislation that transposes the NIS directive into national law. It introduces obligations for operators of essential services and providers of digital services regarding cybersecurity.

PCI DSS

The Payment Card Industry Data Security Standard (PCI DSS) is a global standard for securing payment card data. It requires the implementation of controls to protect cardholders, data encryption, access monitoring, and regular system testing.

PCI DSS

The Payment Card Industry Data Security Standard (PCI DSS) is a global standard for securing payment card data. It requires the implementation of controls to protect cardholders, data encryption, access monitoring, and regular system testing.

PCI DSS

The Payment Card Industry Data Security Standard (PCI DSS) is a global standard for securing payment card data. It requires the implementation of controls to protect cardholders, data encryption, access monitoring, and regular system testing.

MiCA

The Markets in Crypto-Assets Regulation (effective from 2024) is the EU’s legal framework for crypto-assets, stablecoins, and crypto-related service providers. Its aim is to protect investors, ensure market stability, and prevent abuse.

MiCA

The Markets in Crypto-Assets Regulation (effective from 2024) is the EU’s legal framework for crypto-assets, stablecoins, and crypto-related service providers. Its aim is to protect investors, ensure market stability, and prevent abuse.

MiCA

The Markets in Crypto-Assets Regulation (effective from 2024) is the EU’s legal framework for crypto-assets, stablecoins, and crypto-related service providers. Its aim is to protect investors, ensure market stability, and prevent abuse.

GDPR

The General Data Protection Regulation (GDPR) is the EU’s comprehensive data protection law regulating the processing of personal data of EU residents. It provides individuals with extensive rights over their data and imposes strict obligations on organizations, including transparency, consent, breach notifications, and significant penalties for non-compliance.

GDPR

The General Data Protection Regulation (GDPR) is the EU’s comprehensive data protection law regulating the processing of personal data of EU residents. It provides individuals with extensive rights over their data and imposes strict obligations on organizations, including transparency, consent, breach notifications, and significant penalties for non-compliance.

GDPR

The General Data Protection Regulation (GDPR) is the EU’s comprehensive data protection law regulating the processing of personal data of EU residents. It provides individuals with extensive rights over their data and imposes strict obligations on organizations, including transparency, consent, breach notifications, and significant penalties for non-compliance.

AI Governance

Qzila uses artificial intelligence to enhance the core user experience and deliver real value to our users in their daily work. We strive to do this in a way that is trustworthy, reliable, and user-focused.

AI Governance

Qzila uses artificial intelligence to enhance the core user experience and deliver real value to our users in their daily work. We strive to do this in a way that is trustworthy, reliable, and user-focused.

AI Governance

Qzila uses artificial intelligence to enhance the core user experience and deliver real value to our users in their daily work. We strive to do this in a way that is trustworthy, reliable, and user-focused.

Safe and Reliable

Qzila applies a safety-first approach to artificial intelligence. Our AI features and partners undergo security and legal reviews before Qzila begins using their services. These security practices apply both to our AI features and the process of developing them.

Safe and Reliable

Qzila applies a safety-first approach to artificial intelligence. Our AI features and partners undergo security and legal reviews before Qzila begins using their services. These security practices apply both to our AI features and the process of developing them.

Safe and Reliable

Qzila applies a safety-first approach to artificial intelligence. Our AI features and partners undergo security and legal reviews before Qzila begins using their services. These security practices apply both to our AI features and the process of developing them.

Transparency

At Qzila, we want to be transparent with our customers regarding our AI products. That’s why we maintain a Help Center and dedicated Terms and Privacy pages, clearly describing the functionality of our AI products and outlining privacy practices.

Transparency

At Qzila, we want to be transparent with our customers regarding our AI products. That’s why we maintain a Help Center and dedicated Terms and Privacy pages, clearly describing the functionality of our AI products and outlining privacy practices.

Transparency

At Qzila, we want to be transparent with our customers regarding our AI products. That’s why we maintain a Help Center and dedicated Terms and Privacy pages, clearly describing the functionality of our AI products and outlining privacy practices.

Data Governance

Your data is yours. Our AI subcontractors are prohibited from using customer data to train models. All access and permissions to customer data are strictly managed and enforced.

Data Governance

Your data is yours. Our AI subcontractors are prohibited from using customer data to train models. All access and permissions to customer data are strictly managed and enforced.

Data Governance

Your data is yours. Our AI subcontractors are prohibited from using customer data to train models. All access and permissions to customer data are strictly managed and enforced.

Empowering

Our goal is to build AI features that are not just interesting but genuinely useful in daily work. The development of our AI tools is based on extensive research into user needs.

Empowering

Our goal is to build AI features that are not just interesting but genuinely useful in daily work. The development of our AI tools is based on extensive research into user needs.

Empowering

Our goal is to build AI features that are not just interesting but genuinely useful in daily work. The development of our AI tools is based on extensive research into user needs.

Reliability

Qzila is used by individuals as well as large enterprises—everyone deserves a platform they can rely on. With robust availability guarantees and multi-layered redundancy, you can trust that Qzila will always be there when you need it.

Reliability

Qzila is used by individuals as well as large enterprises—everyone deserves a platform they can rely on. With robust availability guarantees and multi-layered redundancy, you can trust that Qzila will always be there when you need it.

Reliability

Qzila is used by individuals as well as large enterprises—everyone deserves a platform they can rely on. With robust availability guarantees and multi-layered redundancy, you can trust that Qzila will always be there when you need it.

Service Status

Qzila delivers transparency and simplicity through a status page that provides real-time insights into the availability of our services.

Service Status

Qzila delivers transparency and simplicity through a status page that provides real-time insights into the availability of our services.

Service Status

Qzila delivers transparency and simplicity through a status page that provides real-time insights into the availability of our services.

Enterprise Infrastructure

We partner with AWS and Cloudflare to build a world-class architecture, ensuring that Qzila is designed for maximum business resilience.

Enterprise Infrastructure

We partner with AWS and Cloudflare to build a world-class architecture, ensuring that Qzila is designed for maximum business resilience.

Enterprise Infrastructure

We partner with AWS and Cloudflare to build a world-class architecture, ensuring that Qzila is designed for maximum business resilience.

High Availability and Failover

Qzila safeguards your data with multiple redundancy zones, a comprehensive backup program, and regular testing of our disaster recovery and business continuity plans. Qzila offers a guaranteed 99.9% availability, so users can rely on us to be there whenever they need.

High Availability and Failover

Qzila safeguards your data with multiple redundancy zones, a comprehensive backup program, and regular testing of our disaster recovery and business continuity plans. Qzila offers a guaranteed 99.9% availability, so users can rely on us to be there whenever they need.

High Availability and Failover

Qzila safeguards your data with multiple redundancy zones, a comprehensive backup program, and regular testing of our disaster recovery and business continuity plans. Qzila offers a guaranteed 99.9% availability, so users can rely on us to be there whenever they need.