Tarsal Security
Tarsal is committed to keeping your data safe by following industry-standard practices for securing physical deployments, setting access policies, and leveraging AWS’s security features. If you have any security concerns with Tarsal, or believe you have discovered a vulnerability, please email us at security@tarsal.coSecuring your data
Tarsal connectors operate as the data pipes moving data from point A to point B: extracting data from data sources, normalizing it, and loading it into destination platforms (warehouses, SIEMs, data lakes) with optional transformation performed in-flight. As soon as data is transferred from the source to the destination, it is purged from Tarsal’s databases.Sensitive Data
Because Tarsal is not aware of the data being transferred, users are required to follow the Terms of Service and are responsible for ensuring their data transfer is compliant with their jurisdiction. For more information, see Tarsal’s Privacy Policy Tarsal stores the following data:Technical Logs
Technical logs are stored for troubleshooting purposes and may contain sensitive data based on the connection’s state data. If your connection is set to incrementally sync, users choose which column is the cursor for their connection. We strongly recommend setting the cursor to a timestamp like anupdated_at
column, but users can choose any column they want.