Apollo privacy center

Apollo cares about your data privacy. Under data privacy or protection laws like the GDPR or CCPA, you have certain privacy rights. You can exercise some of those rights by following the instructions below.

Opt out of Apollo – object to our processing, opt out of sales, and request deletion of your profile

Want to opt out of Apollo by removing your existing individual profile from Apollo’s services and opting out of our use and sharing of it? Click the button below. If you make this choice, all information contained in your profile will be removed and your record will become unavailable in our products as soon as possible. We will maintain your information on a ”suppression” list to avoid reactivating your profile in the future.

Submit opt out request

Request access to collected data

Want to learn about the data Apollo has collected about you? Click the button below. Once we’ve verified your identity, you can specify the type of information you want, and we will send you a report.

Submit information access request

Privacy at Apollo

For your reference, click these links to read our privacy policy and terms of use.

Apollo privacy policy

Apollo terms of service

Audits & certifications

Apollo’s mission is to create the most trusted and intelligent data-first engagement platform. Our robust technology and systems ensure customer data is fully secure. Our security is certified by leading 3rd-party auditors based on the most widely recognized and internationally accepted information security standards.

ISO 27001

We are ISO 27001 certified by A-LIGN, a leading third party cybersecurity and compliance firm.

Download certifications

SOC-2

We are SOC-2 certified by A-LIGN, a leading third-party cybersecurity and compliance firm. Please contact our sales team for access to our complete SOC-2 Report.

ISO 27001 and SOC 2 certified

Certified by leading third-party cybersecurity auditors.

GDPR compliant

Compliant as both a Data Processor and Data Controller. Learn more about Apollo’s adherence to GDPR here.

Encryption in transit 
and at rest

Both idle and active data is encrypted over public networks and in our databases.

Database security

Databases are built with 
multi-layer security including encrypted passwords, two factor authentication, intrusion detection systems, and VPC with strict firewall settings.

Integrations security

Integrated SaaS Services are authorized securely with OAuth2 and credentials are not stored for those services.

Privacy & safety features

Custom control to enable or disable privacy-impacting features based on your needs.

Penetration testing

Annual network and graybox application penetration tests are performed by a certified third party consultant.

Internal and external audits

Audits are carried out, quarterly, on access control, risk, information security, IT infrastructure, and HR procedures.

Data recovery

Regular data backup with a maximum 24-hour RTO and RPO.