How does Weglot manage security and privacy?

In this article, you'll learn about Weglot's security in general.

For more information about our GDPR Compliance, please see our Privacy Policy page.

SOC 2 Type 2 Certification

In 2022, Weglot has been certified as SOC 2 Type 2.

SOC 2 compliance is a voluntary industry standard that specifies how organizations should manage customer data.

The standard is based on five criteria:

  • Security
  • Availability
  • Processing Integrity
  • Confidentiality
  • Privacy

The first stage of SOC 2 compliance is SOC 2 Type 1. It certifies that customers' information is handled securely and responsibly.

The second stage of SOC 2 compliance is SOC Type 2. It verifies that all the policies and processes listed in SOC 2 Type 1 are in continuous use and approves that the controls Weglot has in place are working correctly to protect sensitive data (see our Trust Center page).

You can find further information on this topic in our blog post about SOC 2 Type 2.

Weglot translations and integrations

All the content you translate with Weglot is kept in your Translation List (Translations > Languages in your Weglot Dashboard).

If you use Weglot to translate internal data, conversations, or any confidential content, these contents will be translated and stored in your Translation List. Your team members and our Support Team will have access to these translations.

You can exclude this content to prevent Weglot from translating it.

You will find all the information you need to apply exclusions in our documentation: How to exclude URLs/blocks/words from translation?

Regarding your public API key, Weglot's Support Team can Whitelist the domains that you want to authorize using your API key. You will need to contact our Support Team to do so.

The Trust Center

The Trust Center combines all the information regarding Weglot's compliance with SOC 2 Type 2 compliance. It details the compliance report, security, and policies that are in place. You can also find a list of Weglot's continuous monitoring. This page lists Weglot's subprocessors used to offer our service. Finally, you'll find a link to our Privacy policy.

Frequently Asked Questions

Can Weglot provide a DPA?

Weglot can arrange such an agreement in the Enterprise package, which guarantees a Data Protection Agreement between your company and Weglot.
More information is in our documentation: Can Weglot provide a DPA?

Can I report a security vulnerability?

Weglot has not subscribed to a bug bounty program but you can report a potential security vulnerability.

If you believe you have found a security vulnerability in one of our products or platforms, please read our Responsible Disclosure Policy before you take action.

You can find this information on our Privacy Policy page.

Can my visitors know that I am using Weglot?

Your visitors can indeed know that you are using Weglot.

They have access to your page's source code with the inspector of their browser. They can find, for example, the HTML code of our switcher.

There are also calls to your Weglot Project that can be seen within the inspector on your translated versions.

If you have created DNS records for Weglot subdomain integration, they can be found using public tools such as DNS Checker.

Did this answer your question? Thanks for the feedback There was a problem submitting your feedback. Please try again later.

Still need help? Contact Us Contact Us