Information Security Policies
Last Updated: April 15th 2020


Argyle takes our security as a number one priority. If you have specific questions or concerns, contact us at

Access Controls

Specific role enabled access controls are enforced at each layer of infrastructure. Multi-factor authentication is required for access to Argyle infrastructure. All application and user access logs are stored centrally and monitored.

Audit Logs

All operations on personally identifiable information (PII) are recorded in tamper proof write-only audit logs. The logs are stored indefinitely and are regularly checked for unexpected activity.

Routine Tests

Argyle regularly undergoes both internal network penetration tests and security audits. All code is reviewed by a peer review system.

Traffic Controls

The Argyle API only allows client requests using strong TLS protocols and ciphers. Communication between Argyle infrastructure and data platforms is transmitted over encrypted tunnels.