Trust is paramount for successful business partnerships.
That’s why ThoughtSpot is committed to making security,
privacy, and compliance its top priority.
Trusted, enterprise-grade AI enables faster, better decision-making.
Set your own policies on users and roles, security features, and searchable data sets.
Rest easy knowing that our procedures, processes, and data centers keep your data secure at all times. data secure at all times.
Safe and transparent customer data management policies that are aligned with data privacy regulations.
ThoughtSpot Cloud’s architecture is designed from the ground up with data security an integral part of what we do.
ThoughtSpot performs regular risk assessments and operates a responsible disclosure program.
Our policies and legal terms set standards for our commitments to data security and privacy.
ThoughtSpot Cloud features controls to enforce your
data governance policies and access rules.
Connect to the data warehouses of your choice to run live queries without moving your data.
Select only relevant source data tables and columns to make available for analysis.
Assign users, roles and privileges with differentiated access and available actions.
Allocate user privileges to share content, with ability to revoke access to previously shared content as needed.
Set granular object, column, row-level security rules to control what users are permitted to see.
Data no longer needed on an updated liveboard or answer is proactively deleted.
The safety of your data is our top priority.
Fully isolated tenants to prevent data leakage and provide protection against unauthorized access.
Multiple services monitor, detect, and protect against common attack vectors.
Comprehensive support for data encryption at rest and in transit, leveraging AES 256-bit encryption and keys unique to each customer.
ThoughtSpot Cloud runs on the industry’s most secure cloud infrastructures.
Your data remains stored in the data warehouse of your choice, and queries are performed live, in-database. No data movement required.
ThoughtSpot supports multi-factored authentication, LDAP, and integrates with various identity providers via SAML.
Granular object, table, column, row-level access rules control what users are permitted to see. Privileges determine what actions users can perform.
You have access to user login and activity logs that are secured and monitored for anomalies.
ThoughtSpot is here to support you however you need. You control the level of access you want to provide to our support team, as well as the way in which you would like to engage us.
Access privileges of ThoughtSpot employees are based on job requirements using the principle of least privilege access and are revoked upon termination of employment. Entitlements are reviewed semi-annually.
Infrastructure access includes appropriate user account and authorization controls, which include the required use of secure VPN connections, two-factor authentication, complex passwords, account lock-out rules.
All data along with the tenant instance is deleted upon termination or expiration of the agreement or order form.
Our privacy and data protection program only uses data in ways that are consistent with current data protection laws and your wishes as a customer.
The General Data Protection Regulation (“GDPR”) regulates the use and protection of personal data originating from the European Economic Area (“EEA”) and provides individuals rights with regard to their personal data. ThoughtSpot is committed to supporting our customers in their GDPR compliance efforts. See ThoughtSpot’s Processing Addendum (DPA”) .
The California Consumer Privacy Act (“CCPA”) creates consumer rights relating to the access to, deletion of, and sharing of personal information that is collected by businesses. ThoughtSpot is committed to supporting its customers in their CCPA compliance efforts. The ThoughtSpot DPA addresses both GDPR and CCPA requirements.
ThoughtSpot’s robust privacy and security commitments outline how we protect user data and prioritize privacy apply equally to our use of AI. ThoughtSpot is committed to preserving our customers' privacy with ThoughtSpot Cloud AI-powered analytics and to supporting our customer’s privacy compliance efforts. See below under “ThoughtSpot Cloud AI Features” for more information on how ThoughtSpot utilizes AI in ThoughtSpot Cloud.
The Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) regulates protecting the privacy and security of health information. ThoughtSpot can support HIPAA-related customer data after a Business Associate Agreement (BAA) has been properly executed with ThoughtSpot. For more information on how ThoughtSpot Cloud provides security controls to meet the requirements of HIPAA, please see the Security Infrastructure and HIPAA Whitepaper .
For transfers to the United States, ThoughtSpot has self-certified to, and we are participants in, the new Data Privacy Framework (“DPF”). The EU-U.S. DPF, UK Extension to the EU-U.S. DPF, and Swiss-U.S. DPF were respectively developed by the U.S. Department of Commerce and the European Commission, UK Government, and Swiss Federal Administration to provide U.S. organizations with reliable mechanisms for personal data transfers to the United States from the European Union, United Kingdom, and Switzerland while ensuring data protection that is consistent with EU, UK, and Swiss law.
ThoughtSpot’s continued adherence to the DPF can be found at the Data Privacy Framework site and in the Data Privacy Framework Policy.
ThoughtSpot continues to use Standard Contractual Clauses (“SCCs”), which remain valid under the Schrems II decision by the European Court of Justice, as a legal mechanism for transferring personal data of its customers from the EEA to applicable jurisdictions. Our DPA includes the new EU Standard Contractual Clauses to support these transfers where applicable.
We also offer ‘Supplementary Measures’ to our customers – these are technical and operational measures (including encryption controls and disclosures regarding government requests for access to data) to provide data protection controls for our EU data transfers.
For more information, See our Transfer Impact Assessment Whitepaper here .
ThoughtSpot has published guidelines describing our practices for responding to Third- Party Authority Requests. The ThoughtSpot Law Enforcement Guidelines describe our practices and procedures for responding to any Third-Party Authority requests.
Annually, ThoughtSpot publishes its Transparency Report , which outlines the number of requests from Third-Party Authorities that ThoughtSpot has received for customer data. Up to December 31st, 2023, ThoughtSpot has not received any Third-Party Authority Requests.
At ThoughtSpot, we create trust with our customers through transparency. We are committed to providing customers with clear information about the data we handle and how we use it. ThoughtSpot maintains a Privacy Statement detailing the collection, use, and disclosure of Personal Information obtained through the ThoughtSpot websites; in connection with your purchase and use of our products and related support and professional services; and in connection with events hosted by us where we collect information from registrants and attendees.
ThoughtSpot uses both session‑based and persistent‑based cookies. Session‑based cookies exist only during your web session and expire when you close your internet browser. Persistent‑based cookies stay in one of your browser's subfolders until you delete them manually or your browser deletes them based on the duration period specified by the cookie.elated support and professional services; and in connection with events hosted by us where we collect information from registrants and attendees.
ThoughtSpot does not sell your data, and does not mine or access your data for advertising purposes. ThoughtSpot also contractually commits that ThoughtSpot employees and authorized, verified contractors will only have access to customer data on a need-to-know basis.
ThoughtSpot’s procedures, processes, and data
centers keep your data secure at all times.
ThoughtSpot’s modern cloud data centers are designed for scale and elasticity, while ensuring your data is protected against unauthorized breaches or data loss
ThoughtSpot secures its buildings and workspaces from unauthorized access to protect ThoughtSpot personnel, assets, and data. All ThoughtSpot employees, as well as contractors and third-parties, with a legitimate business need to physically access any ThoughtSpot facilities must comply with the security requirements to ensure maximum security.
ThoughtSpot’s data centers are designed to anticipate and tolerate failure while maintaining service levels. In case of failure, automated processes move traffic away from the affected area and there is sufficient capacity to enable traffic to be load-balanced to the remaining sites.
Critical system components are backed up across multiple, isolated locations and are engineered to operate independently with high reliability. Highly resilient systems deliver the highest levels of service availability, and in the event of an outage, enable customers to achieve extremely short recovery time and recovery point objectives.
Service usage is continuously monitored to support our availability commitments and requirements, and measured at least monthly against a capacity planning model. This model supports planning of future demands and includes considerations such as information processing, telecommunications, and audit log storage.
ThoughtSpot employees are properly vetted and trained to ensure compliance with security and privacy controls
All employees who need data center access must first apply for access and provide a valid business justification. These requests are granted based on the principle of least privilege and are reviewed.
ThoughtSpot conducts background checks on all employees in accordance with relevant laws and regulations, and proportional to the business requirements, the sensitivity of the information to be accessed, and the perceived risks in accordance with ThoughtSpot’s Background Check Policy.
ThoughtSpot provides security training to help employees avoid creating undue risks. Employees must complete information security training within a reasonable time after initial hire and quarterly thereafter. ThoughtSpot retains attendance records and copies of security training materials to ensure proper completion of the training before any employee is granted access to systems.
ThoughtSpot is vigilant about the security and privacy of your data
All data flowing across the global network that interconnects our data centers and regions is automatically encrypted before it leaves our secured facilities. Your data is encrypted in transit and at rest to ensure that only authorized users can access it.
ThoughtSpot can give you the control and visibility you need to comply with regional and local data privacy laws and regulations. The design of the global infrastructure allows you to retain complete control over the regions in which your data is physically located, helping you meet data residency requirements.
Row level security (RLS) allows you to restrict a group’s access down to the table row. Once a rule is defined, as a group member searches, views an answer, or otherwise works with data, ThoughtSpot evaluates the user’s access against the rules and prevents the display of the restricted data. As a result, users see only the data they are permitted to see.
ThoughtSpot maintains secure application development policies and procedures aligned with industry-standard practices such as the OWASP Top Ten. All personnel responsible for secure application design and development receive appropriate training regarding ThoughtSpot’s secure application development practices. ThoughtSpot performs a combination of static and dynamic testing and code analysis and addresses any high priority vulnerabilities prior to each release.
ThoughtSpot performs regular risk assessments and operates a responsible disclosure program
ThoughtSpot has successfully completed the Service Organization Control (SOC) 2 Type II audit. The SOC 2 report verifies the suitability of the design and operating effectiveness of ThoughtSpot’s information security practices, policies, procedures, and operations to meet the standards for security, availability, and confidentiality.
ThoughtSpot performs information security risk assessments as part of a risk governance program that regularly tests, assesses and evaluates the effectiveness of the security program. Such assessments recognize and assess the impact of risks and implement risk reduction or mitigation strategies to address new and evolving security technologies, changes to industry standard practices, and changing security threats. This risk program is audited annually by an independent third party.
When software vulnerabilities are revealed and addressed by a vendor patch, ThoughtSpot will obtain the patch from the applicable vendor and apply it within an appropriate time frame in accordance with ThoughtSpot’s then-current vulnerability management and security patch management standard operating procedure and only after it is tested and determined to be safe for installation in all production systems.
ThoughtSpot delivers AI-driven insights using the power of large language models (“LLMs”) that work on your business data, all while maintaining enterprise-level security, compliance, and privacy. ThoughtSpot utilizes leading LLMs from providers as disclosed on ThoughtSpot’s Sub-processors page.
With ThoughtSpot Cloud, users can be assured that AI responses are grounded to their data. Advanced human-in-the-loop feedback ensures that your users are at the center of every interaction and they get the most relevant answers.
You enable AI features in ThoughtSpot Cloud as desired, using granular permissions and controls ensuring AI is used the way you want.
Customer data is not and will not be used for training of provider LLMs.
ThoughtSpot Cloud uses modified content and abuse monitoring which means data is not logged nor is it used for abuse monitoring or content filtering. This means provider LLMs will not store associated prompts or responses.
See FAQs below for additional information.
ThoughtSpot AI-powered analytics takes search-driven analytics to the next level with natural language and generative AI. ThoughtSpot, together with LLMs, combines the ease of natural language with the accuracy of our patented search and the governance your business demands. Users can ask business questions in natural language to easily search for existing content across your analytics catalog, create new charts and visualizations, get AI-generated answers, get AI-powered search recommendations, and more.
When using AI features, minimal data is sent as part of user queries. The following data may be sent as part of prompts:
Query Text/Prompt.
Column Names.
Column Descriptions.
Sample Data Values (three sample values for each text attribute column).
ThoughtSpot’s company policies and legal terms set
standards for its commitments to data security and privacy
ThoughtSpot is committed to protecting the privacy of others, including with regard to its use of browser cookies.
This policy describes the information we collect by automated means through the use of information gathering tools on ThoughtSpot’s website.
ThoughtSpot’s obligations to subscribers and licensees are included on this page.
For customers making data available to ThoughtSpot under GDPR, the DPA may be countersigned to impose additional commitments on ThoughtSpot.
ThoughtSpot is committed to acting ethically, responsibly, and fighting forced labor.