Waveloop
Security & Trust

Your data security is our priority

Waveloop is built on Meta's official Instagram Graph API, encrypts every byte in transit and at rest, and follows least-privilege access across our infrastructure.

🛡️

Meta-Approved Tech Provider

Official Instagram Graph API integration. No browser automation, no scraping, no password sharing.

🔒

Encrypted End-to-End

TLS 1.2+ in transit and industry-standard encryption at rest for all customer data.

Privacy by Design

GDPR-aware practices and a published DPA. We don't sell data and don't train AI on customer messages.

Meta-Approved Instagram Integration

Waveloop is a Meta Tech Provider. Every Instagram action your account performs through Waveloop goes through Meta's official Graph API, with the scopes you explicitly authorize via the standard Meta OAuth 2.0 login flow. We never ask for, store, or transmit your Instagram password.

Encryption

Infrastructure

Access Control

Application Security

Incident Response

We maintain a documented incident response procedure that covers detection, triage, containment, eradication, recovery, and post-incident review. In the event of a personal data breach, customers will be notified without undue delay and in any event within 72 hours of confirmation, in accordance with our Data Processing Agreement.

Backups & Disaster Recovery

Vendor & Sub-processor Security

We rely on a small set of carefully selected sub-processors (cloud hosting, payments, email, analytics). Each is bound by data-protection obligations equivalent to those in our DPA. The current list and notification process are in the DPA.

Privacy & Compliance

Responsible Disclosure

If you believe you've discovered a security vulnerability in Waveloop, please report it privately to [email protected]. We'll acknowledge receipt within two business days, work with you on a fix, and credit researchers who report in good faith and follow standard responsible-disclosure practice. Please do not test on accounts you don't own and do not access, modify, or delete data belonging to other users.

Contact

General questions: [email protected]
Security reports: [email protected]

Security is an ongoing program. We continue to invest in formal certifications (e.g., SOC 2, ISO 27001) as we scale.