How we protect your data

Greyparrot Analyzer meets the world's most widely-recognised security standards, and gives you full control over who gets access. 

Maintaining those high standards of security and privacy is paramount: as threats evolve, so do we.




Our certifications

Whether you're a Greyparrot customer or partner, we're committed to protecting your information.  

Certifications guarantee that our security measures are keeping your data safe, with regular security reviews future-proofing our protection.

ISO-27001

ISO/IEC 27001

Internationally-recognised data security measures to ensure we're going beyond best practice.

Cyber-Essentials-Logo-v2

Cyber Essentials

The UK government’s cybersecurity certification, held from 2023 until we achieved ISO certification.

Who has access to Analyzer data?

If you're a Greyparrot customer using the Analyzer portal, you have full control over who sees your data. Access is limited to the users you select, and our team of engineers.

  • You decide who can see your data with granular permissions, using them to encourage consistent reporting across your business.
  • Our analysts review your facility's data to help you identify opportunities to maximise profitability and efficiency.
  • Our engineers access anonymised data collected by Analyzer units, using it to continuously improve our AI’s waste recognition and comply with legal requirements where required.
user management-min
Live monitoring-min

What kind of data do we collect?

Our data security measures cover all three types of data we collect for Greyparrot Analyzer users:

  • To keep the Analyzer portal secure, logging in and tracking usage requires personal data like contact information. We can arrange fully-anonymised access on request.
  • Our engineers tailor Analyzer to your specific needs using information about your plant's layout, operations and waste streams. 
  • The waste data that the Analyzers generate will never be shared with third parties in any way that could be attributable to customers. It will always be in an anonymised and aggregated format before being used for purposes such as improving our AI recognition.

Learn more about the kinds of data we collect – and how we use it – in our privacy policy.

How we store data securely at scale 

Cloud storage allows us to store a massive amount of data without our customers paying for expensive on-site hardware and maintenance – or sacrificing security. That means Analyzer scales right alongside your data-driven operations as they grow. 

It also enables us to keep Analyzer's footprint in your facility incredibly small, without needing further software installation or more physical space for servers. Most installations don't require any significant infrastructure adjustment or new software. 

We use Amazon Web Services (AWS) to store the waste data Analyzer gathers in your facility, as well as the user account information in the Analyzer portal.   

Is data protected in the cloud? 

Yes – in fact, it's arguably more secure: 

  • Verizon’s Data Breach Report 2020 showed that on-premises breaches accounted for 69% of all breaches, whilst cloud accounted for 24%.
  • An IBM report found that 41% of data incidents involve on-premises systems, against 24% involving data in the cloud. 

Cloud systems like AWS maintain dozens of security standards (including ISO 27001, SOC2 and SOC3), and are continuously audited by cybersecurity experts. Global cloud providers invest such a vast amount of funding and resources into security that an equivalent on-site solution would be cost-prohibitive. 

Our system also anonymises Analyzer images once they're in the cloud – so even in the event of a minor breach, there's nothing to link them to specific customers. 

What if I have specific security requirements?

If you have specific anonymity requirements not covered by our existing protections or require on-premises data storage, we may be able to tailor our security arrangement.

This could involve structuring our engagement so that customer or site names are not used at any point (e.g. referring to "Plant 1"), or that anonymous credentials are used at logins. 

If you have special security requirements, speak to a member of our team here

Ongoing support

No solution is ever fully secure, but incidents are rarely caused by cloud storage: statistically, breaches are most likely to be the result of human error. 

Our support team helps secure access points by reviewing permissions, recommending improvements, and helping our customers implement security features like two-factor authentication.

Learn more about our industry-leading support here.

Greyparrot

Digitisation you can trust

If you have any questions about how we gather and protect the data that will transform your operations, talk to a member of our team.