Privacy Policy

Last updated: 29/06/2025

1. Introduction

This Privacy Policy describes how ClickPipes ("we", "our", or "us") collects, uses, and discloses your personal information when you visit our website at https://clickpipes.co, use our applications, or otherwise interact with us (collectively, the "Services").

We respect your privacy and are committed to protecting your personal information. Please read this Privacy Policy carefully to understand our policies and practices regarding your information and how we will treat it.

2. Information We Collect

We collect several types of information from and about users of our Services, including:

  • Personal Information: This includes information that can be used to identify you, such as your name, email address, postal address, phone number, and other identifiers.
  • Usage Information: Details of your visits to our Services, including traffic data, location data, logs, and other communication data and the resources that you access and use on the Services.
  • Device Information: Information about your computer and internet connection, including your IP address, operating system, and browser type.
  • Database Configuration Information: When you use our data integration services, we collect information about your database configurations, connection details, and credentials.

3. Data Security

As a data integration and transmission product, we understand and value the importance of data security in your business. One of the most important goals in the design and construction of our cloud product is to provide you with the most secure and reliable data integration and management services.

To achieve this goal, ClickPipes does its best to ensure the security of user data in various aspects such as user data security, product features, and internal operation processes.

User Data Security

User Data Storage and Retention Policy

ClickPipes follows strict policies and has strict usage scopes for your data. In the following situations, ClickPipes will temporarily retain your data, but always encrypts it using AES algorithm and uses a program to remove it from our system:

  1. When loading models and inferring target models, the service will retain relevant table structure information. After the data source is deleted, the table structure information will be deleted immediately.
  2. When a task encounters an exception, some error logs will be uploaded to the cloud for you to view. These data will be deleted after the task is deleted, or after a maximum of seven days.
  3. When you preview a data table, some data will be temporarily transferred to the cloud server through the computing engine, but will be immediately cleaned up after the preview ends.

Database Configuration Information Security Policy

The database and API credentials you provide to us when connecting to data sources and targets are encrypted using keys specifically for you. No one except the application itself can access these credentials.

Data Source Connection Security Policy

  1. ClickPipes allows you to establish connections with data sources and targets through SSH tunnels where applicable.
  2. For all data sources, ClickPipes supports SSL, or related encryption methods using SSL technology for connection and data acquisition.
  3. Connections to SaaS data sources are encrypted via HTTPS.
  4. The product provides fully managed and semi-managed modes. If you choose semi-managed, all user data, whether source data or processed data, will be stored and processed in your private environment. Our processing engine will run in your environment without uploading any data information to the cloud. In a fully managed environment, during the normal task execution process, all user data will only pass through your source, your processing engine, and the target itself, without uploading any data to the cloud. The fully managed mode engine exposes its own IP address for you to set on the data source side, ensuring that data is not leaked due to the use of ClickPipes.

User Account Password Security Policy

ClickPipes CLOUD user credentials are stored using industry-standard and audited one-way hashing mechanisms. Different user data has its unique hash storage key, which is stored in a separate database, and all data read and write operations are audited to prevent user data leakage.

Data Transmission and Processing Security

By default, ClickPipes' data processing does not go through third-party components. Except for reading and writing data sources, all processing is done in memory.

If you enable the database log cache feature, some source database event information will be stored in the engine's local directory. This information is stored encrypted and, under no circumstances, will be transmitted to any location other than the destination.

Product Feature Design Security

Data Display Privacy Policy

We respect and protect your data privacy. All sensitive information, such as usernames, passwords, authentication information, database addresses, etc., will be masked in all user-visible locations, including but not limited to front-end input boxes, monitoring pages, consoles, and engine logs, and all places that can be seen by users, to avoid information leakage at the display layer.

Critical Data Hiding Design

For your sensitive data tables, user administrators can mark certain fields as sensitive. After setting, users will not be able to view this data through any means in the interface, including: data preview, data exploration, log printing, and all related functions.

Adjustments to sensitive fields require administrator privileges and secondary authentication, and all adjustments are recorded in immutable audit logs.

User Roles and Permissions

We understand that each organization may have various different roles and responsibilities, as well as corresponding data permission requirements. ClickPipes Cloud supports some predefined user roles, such as administrators, operations personnel, data analysis engineers, data engineers, etc., and also supports administrators to create custom roles through flexible role combinations, and allows assigning various resource create, delete, modify, and query permissions to roles. We know that data is your valuable asset, and we will do our utmost to protect your data and provide a powerful and flexible user role and permission management system to help you better control data access and operations.

User Operation Audit

All user actions are recorded and audited. This allows you to easily track who did what, when it was done, and what changes were made. This is a key security feature we provide that can help you detect and prevent any unauthorized behavior.

Account and Access Control

We provide multiple security verifications to protect your account, including login frequency, region, device, and other checks. Any abnormal behavior will immediately trigger an alert. At the same time, we have added secondary authentication mechanisms for operations on data sources and tasks to prevent your data from being transmitted externally through tasks, maximizing the protection of your data security.

End-to-End Encryption

We provide end-to-end encryption options to encrypt the configuration of data sources and tasks, making them only editable and understandable by you, fundamentally preventing information leakage.

Operational Process Security

Service Deployment Security

ClickPipes' complete infrastructure is located in the GCP VPC and implements strict firewall controls on inbound and outbound traffic.

Internal Personnel Operation Audit

We record and monitor all operations related to user data. The development team must follow strict operational processes and permission controls, and any contact with user stored data will be recorded and audited.

All communication channels with customers, including email and chat, are protected by strong password controls and two-factor authentication, and support internal team security reviews.

Security Compliance

We comply with all relevant regulations and standards to ensure our services meet the highest security standards.

Continuous Security Improvement

Our security team continuously monitors and improves our security measures to address new threats and challenges.

At ClickPipes, we are committed to providing a secure and reliable data integration and management platform. Your data security is our top priority, and we will do our utmost to protect your data, allowing you to use our services with peace of mind.

4. How We Use Your Information

We use information that we collect about you or that you provide to us, including any personal information:

  • To present our Services and their contents to you.
  • To provide you with information, products, or services that you request from us.
  • To fulfill any other purpose for which you provide it.
  • To provide you with notices about your account.
  • To carry out our obligations and enforce our rights arising from any contracts entered into between you and us, including for billing and collection.
  • To notify you about changes to our Services or any products or services we offer or provide through it.
  • To improve our Services and to deliver a better and more personalized service.
  • For any other purpose with your consent.

5. Disclosure of Your Information

We may disclose personal information that we collect or you provide as described in this Privacy Policy:

  • To our subsidiaries and affiliates.
  • To contractors, service providers, and other third parties we use to support our business.
  • To a buyer or other successor in the event of a merger, divestiture, restructuring, reorganization, dissolution, or other sale or transfer of some or all of our assets.
  • To fulfill the purpose for which you provide it.
  • For any other purpose disclosed by us when you provide the information.
  • With your consent.
  • To comply with any court order, law, or legal process, including to respond to any government or regulatory request.
  • To enforce or apply our terms of use and other agreements, including for billing and collection purposes.
  • If we believe disclosure is necessary or appropriate to protect the rights, property, or safety of ClickPipes, our customers, or others.

6. Your Choices About Our Collection, Use, and Disclosure

We strive to provide you with choices regarding the personal information you provide to us. We have created mechanisms to provide you with the following control over your information:

  • Tracking Technologies and Advertising. You can set your browser to refuse all or some browser cookies, or to alert you when cookies are being sent.
  • Promotional Offers from the Company. If you do not wish to have your email address used by the Company to promote our own or third parties' products or services, you can opt-out by checking the relevant box located on the form on which we collect your data or by sending us an email stating your request.
  • Targeted Advertising. If you do not want us to use information that we collect or that you provide to us to deliver advertisements according to our advertisers' target-audience preferences, you can opt-out by checking the relevant box located on the form on which we collect your data.

7. Data Retention

We will only retain your personal information for as long as necessary to fulfill the purposes we collected it for, including for the purposes of satisfying any legal, accounting, or reporting requirements.

To determine the appropriate retention period for personal information, we consider the amount, nature, and sensitivity of the personal information, the potential risk of harm from unauthorized use or disclosure of your personal information, the purposes for which we process your personal information and whether we can achieve those purposes through other means, and the applicable legal requirements.

8. Children's Privacy

Our Services are not intended for children under 16 years of age. No one under age 16 may provide any information to or on the Services. We do not knowingly collect personal information from children under 16. If you are under 16, do not use or provide any information on our Services. If we learn we have collected or received personal information from a child under 16 without verification of parental consent, we will delete that information.

9. International Data Transfers

Your information, including personal information, may be transferred to — and maintained on — computers located outside of your state, province, country or other governmental jurisdiction where the data protection laws may differ from those of your jurisdiction.

If you are located outside the United States and choose to provide information to us, please note that we transfer the information, including personal information, to the United States and process it there.

Your consent to this Privacy Policy followed by your submission of such information represents your agreement to that transfer.

10. Changes to Our Privacy Policy

We may update our Privacy Policy from time to time. If we make material changes to how we treat our users' personal information, we will notify you through a notice on the Services home page or by email to the primary email address specified in your account.

The date the Privacy Policy was last revised is identified at the top of the page. You are responsible for ensuring we have an up-to-date active and deliverable email address for you, and for periodically visiting our Services and this Privacy Policy to check for any changes.

11. Contact Information

To ask questions or comment about this Privacy Policy and our privacy practices, contact us at: