This policy describes the types of information we may collect from you or that you may provide when you visit the web site and our practices for collecting, using, maintaining, protecting, and disclosing that information.
WattIQ is committed to providing you critical insights to more effectively manage your assets in easy to install, easy to understand ways. We take the same approach to our legal terms, keeping them simple and transparent.
The following is a list of subprocessors involved in providing customer-facing services, or in communications between customers and WattIQ
WattIQ is committed to fast response to all critical security vulnerabilities, including those which may affect third-party subprocessors. This page describes our response to the "Log4J vulnerability" (CVE-2021-44228).
WattIQ uses best practices and industry standards to achieve compliance with industry-accepted general security and privacy frameworks, which in turn helps our subscribers meet their own compliance standards.
WattIQ undergoes routine auditing to achieve compliance with SOC2 standards and receive regularly updated reports. The most recent report is available to customers and qualified parties under NDA. Contact email@example.com to request access.
Find out how we helped others in achieving great savings.