Trust is paramount for successful business partnerships.
That’s why ThoughtSpot is committed to making security,
privacy, and compliance its top priority.
Set your own policies on users and
roles, security features, and searchable
data sets.
Learn more
ThoughtSpot Cloud’s architecture is designed from the ground up with data security an integral part of what we do.
Learn more
Safe and transparent customer data management policies that are aligned with data privacy regulations.
Learn more
Rest easy knowing that our procedures, processes, and data centers keep your data secure at all times.
data secure at all times.
Learn more
ThoughtSpot performs regular risk assessments and operates a responsible disclosure program.
Learn more
Our policies and legal terms set standards for our commitments to data security and privacy.
Learn more
ThoughtSpot Cloud features controls to enforce your
data governance policies and access rules.
Connect to the data warehouses of your choice to run live queries without moving your data.
Select only relevant source data tables and columns to make available for analysis.
Assign users, roles and privileges with differentiated access and available actions.
Allocate user privileges to share content, with ability to revoke access to previously shared content as needed.
Set granular object, column, row-level security rules to control what users are permitted to see.
Data no longer needed on an updated liveboard or answer is proactively deleted.
The safety of your data is our top priority.
Fully isolated tenants to prevent data leakage and provide protection against unauthorized access.
Multiple services monitor, detect, and protect against common attack vectors.
Comprehensive support for data encryption at rest and in transit, leveraging AES 256-bit encryption and keys unique to each customer.
ThoughtSpot Cloud runs on the industry’s most secure cloud infrastructures.
Your data remains stored in the data warehouse of your choice, and queries are performed live, in-database. No data movement required.
ThoughtSpot supports multi-factored authentication, LDAP, and integrates with various identity providers via SAML.
Granular object, table, column, row-level access rules control what users are permitted to see. Privileges determine what actions users can perform.
You have access to user login and activity logs that are secured and monitored for anomalies.
ThoughtSpot is here to support you however you need. You control the level of access you want to provide to our support team, as well as the way in which you would like to engage us.
Access privileges of ThoughtSpot employees are based on job requirements using the principle of least privilege access and are revoked upon termination of employment. Entitlements are reviewed semi-annually.
Infrastructure access includes appropriate user account and authorization controls, which include the required use of secure VPN connections, two-factor authentication, complex passwords, account lock-out rules.
All data along with the tenant instance is deleted upon termination or expiration of the agreement or order form.
Our privacy and data protection program only uses data in ways that are consistent with current data protection laws and your wishes as a customer.
The General Data Protection Regulation (“GDPR”) regulates the use and protection of personal data originating from the European Economic Area (“EEA”) and provides individuals rights with regard to their personal data. ThoughtSpot is committed to supporting our customers in their GDPR compliance efforts. See ThoughtSpot’s Processing Addendum (DPA”).
The California Consumer Privacy Act (“CCPA”) creates consumer rights relating to the access to, deletion of, and sharing of personal information that is collected by businesses. ThoughtSpot is committed to supporting its customers in their CCPA compliance efforts. The ThoughtSpot DPA addresses both GDPR and CCPA requirements.
ThoughtSpot’s robust privacy and security commitments outline how we protect user data and prioritize privacy apply equally to our use of AI. ThoughtSpot is committed to preserving our customers' privacy with ThoughtSpot Cloud AI-powered analytics and to supporting our customer’s privacy compliance efforts. See below under “ThoughtSpot Cloud AI Features” for more information on how ThoughtSpot utilizes AI in ThoughtSpot Cloud.
The Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) regulates protecting the privacy and security of health information. ThoughtSpot can support HIPAA-related customer data after a Business Associate Agreement (BAA) has been properly executed with ThoughtSpot. For more information on how ThoughtSpot Cloud provides security controls to meet the requirements of HIPAA, please see the Security Infrastructure and HIPAA Whitepaper.
For transfers to the United States, ThoughtSpot has self-certified to, and we are participants in, the new Data Privacy Framework (“DPF”). The EU-U.S. DPF, UK Extension to the EU-U.S. DPF, and Swiss-U.S. DPF were respectively developed by the U.S. Department of Commerce and the European Commission, UK Government, and Swiss Federal Administration to provide U.S. organizations with reliable mechanisms for personal data transfers to the United States from the European Union, United Kingdom, and Switzerland while ensuring data protection that is consistent with EU, UK, and Swiss law.
ThoughtSpot’s continued adherence to the DPF can be found at the Data Privacy Framework site and in the Data Privacy Framework Policy.
ThoughtSpot continues to use Standard Contractual Clauses (“SCCs”), which remain valid under the Schrems II decision by the European Court of Justice, as a legal mechanism for transferring personal data of its customers from the EEA to applicable jurisdictions. Our DPA includes the new EU Standard Contractual Clauses to support these transfers where applicable.
We also offer ‘Supplementary Measures’ to our customers – these are technical and operational measures (including encryption controls and disclosures regarding government requests for access to data) to provide data protection controls for our EU data transfers.
For more information, See our Transfer Impact Assessment Whitepaper here.
ThoughtSpot has published guidelines describing our practices for responding to Third- Party Authority Requests. The ThoughtSpot Law Enforcement Guidelines describe our practices and procedures for responding to any Third-Party Authority requests.
Annually, ThoughtSpot publishes its Transparency Report, which outlines the number of requests from Third-Party Authorities that ThoughtSpot has received for customer data. Up to December 31st, 2023, ThoughtSpot has not received any Third-Party Authority Requests.
At ThoughtSpot, we create trust with our customers through transparency. We are committed to providing customers with clear information about the data we handle and how we use it. ThoughtSpot maintains a Privacy Statement detailing the collection, use, and disclosure of Personal Information obtained through the ThoughtSpot websites; in connection with your purchase and use of our products and related support and professional services; and in connection with events hosted by us where we collect information from registrants and attendees.
ThoughtSpot uses both session‑based and persistent‑based cookies. Session‑based cookies exist only during your web session and expire when you close your internet browser. Persistent‑based cookies stay in one of your browser's subfolders until you delete them manually or your browser deletes them based on the duration period specified by the cookie.elated support and professional services; and in connection with events hosted by us where we collect information from registrants and attendees.
ThoughtSpot does not sell your data, and does not mine or access your data for advertising purposes. ThoughtSpot also contractually commits that ThoughtSpot employees and authorized, verified contractors will only have access to customer data on a need-to-know basis.
ThoughtSpot’s procedures, processes, and data
centers keep your data secure at all times.
ThoughtSpot’s modern cloud data centers are designed for scale and elasticity, while ensuring your data is protected against unauthorized breaches or data loss
ThoughtSpot secures its buildings and workspaces from unauthorized access to protect ThoughtSpot personnel, assets, and data. All ThoughtSpot employees, as well as contractors and third-parties, with a legitimate business need to physically access any ThoughtSpot facilities must comply with the security requirements to ensure maximum security.
ThoughtSpot’s data centers are designed to anticipate and tolerate failure while maintaining service levels. In case of failure, automated processes move traffic away from the affected area and there is sufficient capacity to enable traffic to be load-balanced to the remaining sites.
Critical system components are backed up across multiple, isolated locations and are engineered to operate independently with high reliability. Highly resilient systems deliver the highest levels of service availability, and in the event of an outage, enable customers to achieve extremely short recovery time and recovery point objectives.
Service usage is continuously monitored to support our availability commitments and requirements, and measured at least monthly against a capacity planning model. This model supports planning of future demands and includes considerations such as information processing, telecommunications, and audit log storage.
ThoughtSpot employees are properly vetted and trained to ensure compliance with security and privacy controls
All employees who need data center access must first apply for access and provide a valid business justification. These requests are granted based on the principle of least privilege and are reviewed.
ThoughtSpot conducts background checks on all employees in accordance with relevant laws and regulations, and proportional to the business requirements, the sensitivity of the information to be accessed, and the perceived risks in accordance with ThoughtSpot’s Background Check Policy.
ThoughtSpot provides security training to help employees avoid creating undue risks. Employees must complete information security training within a reasonable time after initial hire and quarterly thereafter. ThoughtSpot retains attendance records and copies of security training materials to ensure proper completion of the training before any employee is granted access to systems.
ThoughtSpot is vigilant about the security and privacy of your data
All data flowing across the global network that interconnects our data centers and regions is automatically encrypted before it leaves our secured facilities. Your data is encrypted in transit and at rest to ensure that only authorized users can access it.
ThoughtSpot can give you the control and visibility you need to comply with regional and local data privacy laws and regulations. The design of the global infrastructure allows you to retain complete control over the regions in which your data is physically located, helping you meet data residency requirements.
Row level security (RLS) allows you to restrict a group’s access down to the table row. Once a rule is defined, as a group member searches, views an answer, or otherwise works with data, ThoughtSpot evaluates the user’s access against the rules and prevents the display of the restricted data. As a result, users see only the data they are permitted to see.
ThoughtSpot maintains secure application development policies and procedures aligned with industry-standard practices such as the OWASP Top Ten. All personnel responsible for secure application design and development receive appropriate training regarding ThoughtSpot’s secure application development practices. ThoughtSpot performs a combination of static and dynamic testing and code analysis and addresses any high priority vulnerabilities prior to each release.
ThoughtSpot performs regular risk assessments and operates a responsible disclosure program
ThoughtSpot has successfully completed the Service Organization Control (SOC) 2 Type II audit. The SOC 2 report verifies the suitability of the design and operating effectiveness of ThoughtSpot’s information security practices, policies, procedures, and operations to meet the standards for security, availability, and confidentiality.
ThoughtSpot performs information security risk assessments as part of a risk governance program that regularly tests, assesses and evaluates the effectiveness of the security program. Such assessments recognize and assess the impact of risks and implement risk reduction or mitigation strategies to address new and evolving security technologies, changes to industry standard practices, and changing security threats. This risk program is audited annually by an independent third party.
When software vulnerabilities are revealed and addressed by a vendor patch, ThoughtSpot will obtain the patch from the applicable vendor and apply it within an appropriate time frame in accordance with ThoughtSpot’s then-current vulnerability management and security patch management standard operating procedure and only after it is tested and determined to be safe for installation in all production systems.
ThoughtSpot introduced an AI-powered search experience that puts the power of large language models (“LLMs”) to work on your business data, all while maintaining enterprise-level security, compliance, and privacy. ThoughtSpot utilizes LLMs from leaders in the industry, as disclosed on ThoughtSpot’s Sub-processors page. All AI features are turned off by default and may be enabled by the customer’s ThoughtSpot Cloud administrator.
Your Privacy is Protected
You, as a ThoughtSpot customer, control your data and we process it only in accordance with the agreement(s) we have with you. We do not access your data without your permission and only seek to do so in support of your use of the services.
Your data stays within your organization
With ThoughtSpot Cloud, we recognize that customers want their data to remain private and not be shared for training external Large Language Models. Customers can be confident that their data will not be stored or used by the providers of the LLMs because our use case has been exempted from content monitoring. This means that the providers of the LLMs do not retain any data our customers submit, so you have confidence you can safely pursue data-rich use cases, maintain complete control over your data, and comply with applicable regulations.
Your results are verifiable
AI-generated answers may be inaccurate. With ThoughtSpot Cloud, users can validate the veracity of a response. With advanced human-in-the-loop feedback, you can ensure that humans are at the center of every interaction to ensure you get the most accurate answer you need.
See FAQs below for additional information.
ThoughtSpot AI-powered analytics that takes search-driven analytics to the next level with natural language and generative AI. ThoughtSpot, together with LLMs, combines the ease of natural language with the accuracy of our patented search and the governance your business demands. Now users can ask business questions in natural language to easily search for existing content across your analytics catalog, create new charts and visualizations, get AI-generated answers, get AI-powered search recommendations, and more.
Once a user submits a query using the AI features, the following data may be sent to the large language model provider:
Query Text/Prompt.
Column Names.
Column Descriptions.
Sample Data Values (maximum of three sample values for each text attribute column).
No. ThoughtSpot Cloud is removed from modified content and abuse monitoring, which means that there is no data logging or abuse monitoring or content filtering. As a result, the LLMs will not store the associated request or response data.
No. Customer data will not be used for any training of provider LLMs.
Yes. AI features are disabled by default. If customers choose to enable the AI features, they may also disable AI features at any time and will still be able to use ThoughtSpot Cloud on a search-by-search basis.
ThoughtSpot’s company policies and legal terms set
standards for its commitments to data security and privacy
ThoughtSpot is committed to protecting the privacy of others, including with regard to its use of browser cookies.
This policy describes the information we collect by automated means through the use of information gathering tools on ThoughtSpot’s website.
ThoughtSpot’s obligations to subscribers and licensees are included on this page.
For customers making data available to ThoughtSpot under GDPR, the DPA may be countersigned to impose additional commitments on ThoughtSpot.
ThoughtSpot is committed to acting ethically, responsibly, and fighting forced labor.