The Security guide gives an overview of security and data privacy of Sinch Contact Pro.
This section describes the security measures for Sinch Contact Pro, including the architecture, encryption, and operational procedures.
This section outlines how Sinch Contact Pro handles personal data, detailing the system’s features and functions that support compliance with relevant data privacy laws and industry-specific regulations.
User accounts, their rights, and roles are managed with System Configurator.
Sinch Contact Pro uses role-based user management that enables defining user authorizations on individual, group, or role level. Roles are managed in System Configurator's User and Role Management.
Sinch takes security seriously: products go through penetration testing and security validation, and we are committed to fixing security vulnerabilities classified as high with a patch or, at the latest, in the next release.
