Quild
Privacy Policy hero

Privacy Policy

Learn how Quild collects, uses, and protects your data across our products and services.

Security & privacy

Built to protect your data from day one.

Quild is designed for teams that care deeply about security, compliance, and responsible data use. We combine product safeguards with organizational controls so you can trust the insights you rely on every day.

Last updated: January 22, 2026

Compliance

Security compliance & accreditation

We align our controls with industry‑standard security practices so your teams can adopt Quild with confidence. From access management to audit logging, our platform is built with compliance in mind.

View our security overview
Compliance badges and security illustration

Testing

External testing & hardening

We regularly review our systems with third‑party testing and internal security reviews to identify potential weaknesses before they can be exploited.

Learn about our testing program
Security testing illustration

Trust

Customer requirements & data stewardship

Quild is flexible enough to support a wide range of regulatory, contractual, and internal security requirements. We focus on meeting your needs for data residency, retention, and governance.

Teams collaborating in a secure workspace

Data protection by design

Our architecture is designed so that sensitive information is handled securely across ingestion, processing, and export. Role‑based access controls and workspace boundaries help ensure that only the right people see the right data.

Responsible data use

We use your data to provide and improve the product, not to build unrelated features or services. You stay in control of where your data lives, who can access it, and how long it is retained.

Product compliance features

Quild is built to support modern security and privacy programs, from audit‑ready activity trails to fine‑grained access controls.

Access controls

Fine‑grained roles and permissions help you align Quild with your internal security policies and approval workflows.

Audit‑ready activity logs

Detailed event history gives your security, risk, and compliance teams the visibility they need for investigations and reviews.

Data lifecycle controls

Configurable retention, export, and deletion options help you meet data lifecycle and governance requirements across regions.