Your Data Protection
Security & Data Handling
How Yirla keeps your data safe.
A practical guide to our security, privacy, and data handling practices. Whether you're evaluating Yirla or already a customer, this page gives you everything that you need to know.
The Short Version
- Yirla connects to your ad platforms via secure OAuth2 APIs with read-only access
- Campaign data is retained for 12 months for audit and debug purposes, encrypted at rest using AES-256
- No PII is collected, stored, or processed. Ever
- Customer data is never used to train AI models
- Tenant data is fully isolated. There is no shared query context across customers
- No standing admin access. All privileged access is time-bound, MFA-protected, and audited
- SOC 2 Type I audit is in progress
- DPA and Mutual NDA available upon request
Data Access
- Yirla connects to ad platforms via secure, permissioned OAuth2 APIs
- Access is read-only. We cannot modify campaigns, bids, budgets, or creatives
- We ingest advertising performance metadata only: impressions, clicks, spend, creatives, timestamps, and aggregate-level targeting attributes
- We do not access user-level identifiers, emails, IPs, or LinkedIn member data
- Customers can revoke access at any time via the underlying ad platform
Data Storage & Retention
- Raw campaign data is stored immutably for audit and debug purposes with a 12-month default retention period
- All data at rest is encrypted using AES-256 via AWS-managed KMS keys
- Customers can request deletion at any time. Deletes propagate across raw, derived, and backup layers
- Encrypted backups are stored in separate, access-restricted accounts and tested quarterly
- Customer-managed encryption keys (CMK) available for enterprise contracts
Data Isolation
- Data is logically isolated by tenant at every layer: ingestion, storage, query, and application logic
- There is no shared query context across customers
- Customer data is never mixed across tenants
AI & Model Usage
- Customer data is not used to train foundation models or any third-party AI models
- AI analysis operates on campaign-level signals only. No PII is involved
- If a data source unexpectedly includes PII, it is rejected at ingestion
Access Control
- Role-based access control (RBAC) enforced across the application and infrastructure
- MFA required for all privileged accounts
- There is no standing "God mode" access. Privileged access is time-bound and uses break-glass procedures with post-incident review
- Only a small, role-restricted subset of engineers can access customer data for support or debugging, and only with explicit approval
- All access is logged
- Secrets (API keys, tokens) are stored in AWS Secrets Manager, rotated regularly, and never hard-coded or logged
Infrastructure
- Hosted on Amazon Web Services (AWS), United States
- Encryption in transit via TLS 1.2+ — including internal service-to-service traffic
- Centralized logging with immutable audit logs (AWS S3 with Object Lock — WORM storage)
- Infrastructure activity logs via AWS CloudTrail
- Security monitoring and alerting via AWS GuardDuty
- Network egress is restricted and anomalous access patterns trigger real-time alerts
Sub-Processors
| Sub-processor | Purpose |
|---|---|
| Amazon Web Services (AWS) | Primary infrastructure, hosting, encryption, logging, and monitoring |
| AI model processing and analysis |
Compliance & Certifications
- SOC 2 Type I audit is in progress
- Architecture is GDPR and CCPA aligned — PII-free by design
- Permission-based access and activity logging provide audit readiness for internal security reviews
- Security reviews supported upon request
Documents
DPA and Mutual NDA are available for vendor evaluation. Email hello@yirla.com to request either document or with any additional security questions.
Frequently Asked Questions
What customer data does Yirla collect? Advertising performance metadata only — impressions, clicks, spend, creatives, and aggregate targeting attributes. No PII, user-level identifiers, emails, or IPs.
Do you store raw data? Yes. Raw data is stored immutably for audit and debug purposes with a 12-month default retention period. All stored data is encrypted using AES-256.
Is any PII stored or processed? No. Yirla's data model is explicitly PII-free. If a source unexpectedly includes PII, it is rejected at ingestion.
Is customer data ever mixed across tenants? No. Data is logically isolated by tenant at every layer — ingestion, storage, query, and application logic.
Do you train AI models on customer data? No. Customer data is never used to train foundation models or third-party AI models.
Can Yirla write back to our ad platforms? No. Yirla is read-only. We cannot modify campaigns, bids, budgets, or creatives.
What happens if our credentials are compromised? Credentials are scoped read-only and can be revoked instantly. A compromise does not expose PII or cross-tenant data.
Are you SOC 2 certified? Not yet — SOC 2 Type I is in progress. We support security reviews upon request and can provide documentation to assist with your vendor evaluation.
Do you offer a DPA or NDA? Yes. Email hello@yirla.com to request either.
Do you support security reviews? Yes. Email hello@yirla.com and we'll get you what you need.
Questions not covered here? Email hello@yirla.com
