Data and Security
How to use Touch ID/ Face ID policy and use in Spike
Spike prioritizes keeping your data safe. That’s why we want to be clear about how we recommend that you protect your account. While we offer Touch ID/Face ID login, we suggest using it as a second line of security, in addition to your iOS or Android devices security. Touch ID or Face ID login can however help if you have kids that like to play with your phone and can prevent them from deleting messages or sending some personal pictures (or gibberish) to your contacts.
From the main menu, tap on the gear icon on the top right to go to settings.
On the bottom, you will have the utilities section where you will have the option to set Touch ID after providing authentication.
Who has access to my data?
We believe privacy and security are imperative to being able to have any conversation and are among our core values at Spike. Spike employees are prohibited from accessing user data.
A very limited number of employees have technical access to the keys to the data, on an as-needed basis, but are prohibited from using this to view user data. We have technical controls and audit policies in place to ensure that any access to these keys is logged. Spike has a zero-tolerance policy for any abuse of these procedures.
How is my data stored with Spike?
We store the minimum data that allows us to provide the fastest email experience ever created. The data is stored using the AES-256 algorithm, with per message private key.
You can see more the security measures Spike has in here.
How does Spike protect user data?
As users of our own product, we know how important the privacy and security of your data is to you. Spike treats ALL data with the highest level of security to ensure that your data is protected?. Being able to communicate and collaborate securely, privately, and seamlessly is imperative to business. That’s why we devote so much attention to email encryption and protecting your data and privacy.
All your message data is encrypted using the AES-256 algorithm with a unique key for every message.
We apply software patches on a regular basis and have external security audits by third parties in place to ensure our compliance.
How is data encrypted with Spike?
Message data is encrypted with the AES-256 algorithm with a unique key for every message.
When you click to view the entire email, we fetch it from your provider using the IMAP protocol. Privacy and security are our top priority and we never use, manipulate, or share any of our user’s data or information.
How to remove my data from Spike’s servers
Your data can be removed at any time upon your request by sending an email to email@example.com. In addition, we erase all data after 20 days of inactivity.
What permissions do you need for Android?
When the Spike Android application launches, you’ll be presented with a request for permissions. Here’s the explanation of what Spike requests, and why we request it:
- R/W external storage – this is needed to access attachment files and to save attachments.
- Contacts – to access email addresses of contacts on your existing phone.
- Account – this is used for adding phone accounts (e.g., gmail) to Spike.
- Camera – take photos/ existing photos for attachments and video for video chat (optional).
- Microphone – add voice attachments and for audio/video chats (optional).
- Bluetooth – needed for video chat (optional).
- Audio setting – needed for video chat (optional).
- Location – for sharing location attachment (optional).
- Vibrate – for notification vibration.
How to unsubscribe from Spike’s newsletter
From time to time, Spike sends email newsletters about new features, tips on how to make the most of the app, and more. If you don’t want to receive it, there is an unsubscribe link at the bottom. If you have multiple email accounts in Spike, you’ll need to unsubscribe from each account.