Image

Security

Loop keeps your returns secure

At Loop, security is a top priority. Our security team is made up of educators, engineers, and experts dedicated to enabling resilient security across the board.

Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo

We’ve got your data covered.

When it comes to your data, our team is committed to protecting your confidentiality and privacy, and we test our products and solutions for integrity to make sure that Loop is resilient against breaches.

We know you’re entrusting our team with a lot of data, and we treat it with the care it deserves.

Data image
lock icon

Day-to-day security protocol

As a SOC2 certified company, Loop is diligent about maintaining our security day in and day out, in adherence with all national and international regulations, like GDPR, CCPA, and more. From investigating potential weaknesses in our infrastructure to helping QA our products to teaching our larger team about security and more, our security team has their hands full, and we love them for it.

Server icon

Smart, protected data storage

Most data breaches occur because of poor data storage practices. While Loop doesn’t hold onto much of your data (like credit card numbers and other sensitive information), the data we do store is AES-256 encrypted at rest, and verified by an auditor. We are careful to limit access to this data, and we routinely test our storage systems to protect against attacks from bad actors.

Gallery icon

A top tier team of security experts

Security is ever-evolving, so we expect our security experts at Loop to embrace a curious approach to their work. From getting their CISSP certifications to staying up-to-date on the latest security threats and innovations, our team seeks out opportunities to learn more about security themselves and to help educate the rest of our Loop team and our Loop merchants about what it means to be digitally secure.

Shield icon

Loop’s Trust Center

Find out more about Loop’s infrastructure security, organizational security, product security, internal security procedures, and more regarding data and privacy.

Learn more
Lock icon

Privacy Notice

Access our privacy policy here regarding how we treat user data in-app and elsewhere.

Learn more
check list icon

List of Loop’s Sub-Processors

Access the list of Loop’s subprocessors (as needed for GDPR compliance).

Learn more
Vulnerability Disclosure Policy

Vulnerability Disclosure Policy

Access our Vulnerability Disclosure Policy here regarding how we promote the continued security and privacy of Loop Returns customers, products, and services.

Vulnerability Disclosure Policy

Meet the Loop security team

Jonathan Vaughn

Jonathan Vaughn

Security Engineer

Jonathan Vaughn