Protecting your data is at the core of what we do

Know Your Guest takes data responsibilities seriously, following the strictest privacy and security legal framework to ensure the highest levels of safety and security when collecting and processing personal information.

Our privacy and data protection policy

Know Your Guest does not and will not sell personal data to any third party.

As a company that interacts with consumers across the world, we uphold strict guidelines for data protection to align with global standards. Our privacy policy honours GDPR and UK GDPR.

Know Your Guest by SUPERHOG is registered with the ICO under registration number ZA518818.

Know Your Guest security protocols

We deploy in-depth multilayered security mechanisms and strategies to protect against a wide range of threats and keep your data safe.

Data Encryption

All web traffic through Know Your Guest is encrypted via HTTPS and TLS 1.2. Data in our database is encrypted using AES-256 encryption and is FIPS 140-2 compliant. Decryption keys are stored separately and rotated on a regular basis.

Third-Party Audits

In addition to our own extensive internal testing program, we employ third-party experts to perform penetration testing annually as standard, and additionally after any significant changes to our technical infrastructure.

Employee Checks

All Know Your Guest employees undergo background checks, including checks for any historical involvement with fraudulent or criminal activity, and are subject to ongoing spontaneous background checks throughout their employment.

Data Handling

The processing of data by Know Your Guest is deliberately very tightly constrained by technology in order to limit the vulnerability of our system to human error and deliberate malevolent activity.

Limited Access

Access to the encrypted sensitive documentation which is stored on Know Your Guest is limited, with all access systems logged and frequently monitored, to ensure that no data is compromised.

Continuous Scanning

We maintain a comprehensive vulnerability management program that includes regular scanning, identification, and remediation of security vulnerabilities in our infrastructure and applications.

Ready to get started?