Back to Ping

Data & Security

How we protect your information

Encryption

All data encrypted in transit and at rest

Secure Auth

OAuth-based authentication with secure sessions

Secure Infrastructure

Hosted on enterprise-grade cloud infrastructure

Privacy by Design

Minimal data collection, maximum control

Our Security Approach

Security isn't just a feature — it's foundational to how we build Ping. Your relationship data is deeply personal, and we treat it with the care it deserves.

Data Encryption

In Transit

All data transmitted between your device and our servers is encrypted using TLS 1.3. This means your information is protected from interception while traveling over the internet.

At Rest

Your data is encrypted when stored on our servers using AES-256 encryption. Even if someone gained physical access to our servers, they couldn't read your data.

Authentication & Access

Ping uses OAuth-based authentication through trusted providers. We never store your password directly. Sessions are secured with signed tokens that expire automatically.

Infrastructure Security

  • Cloud hosting: We use enterprise-grade cloud infrastructure with 24/7 monitoring
  • Network security: Firewalls, intrusion detection, and DDoS protection
  • Access controls: Strict internal access policies with audit logging
  • Regular updates: Systems are patched promptly for security vulnerabilities

Data Isolation

Your data is logically isolated from other users. Our systems are designed so that one user can never access another user's data, even accidentally.

AI Processing

When AI features process your data:

  • Processing happens on secure servers, not on third-party AI platforms
  • Your data is never used to train general AI models
  • AI outputs are generated specifically for you and not shared

Data Retention

We retain your data only as long as you use Ping. When you delete your account, we remove your data from our active systems within 30 days. Some data may persist in encrypted backups for up to 90 days for disaster recovery purposes.

Your Security Controls

You have several tools to protect your account:

  • Session management: View and revoke active sessions
  • Data export: Download all your data at any time
  • Account deletion: Permanently delete your account and data
  • Sharing controls: Fine-grained control over what you share

Incident Response

In the unlikely event of a security incident affecting your data, we will:

  • Notify affected users within 72 hours
  • Provide clear information about what happened
  • Explain what we're doing to address it
  • Offer guidance on any steps you should take

Security Questions?

If you have security concerns or want to report a vulnerability, contact us at [email protected].