top of page
Screenshot 2024-02-20 125720.png

How Blink Manages Data

Data security is top of mind at blink.

Blink applies the best practices for the following topics.

  • Data Storage & Encryption

  • Data Access

  • Sharing Permissions

  • Third-Party Technology

  • Certifications

Screenshot 2024-02-20 130047.png

Data Storage & Encryption

Data is stored safely and encrypted by default 

  • Blink applies best practices for data storage and encryption.

  • We work with global cloud providers (i.e., AWS) to secure the database and conduct data encryption at the highest standards. 

  • Communication secured through HTTPS.

  • Data stored by AWS S3 (data center in Italy) with high data security standards.

  • Data encrypted by default with AWS KMS Keys at AES-256 Standard (incl. logs, backups, snapshots, and replication across regions).

  • Secure logins by AWS Cognito.

Data Access

Data access by blink team is critical, which is why we established practical procedures and limitations 

Data accessed by default by blink team 

  • Public Listings that help find good trade opportunity for the platform users and to run analytics to understand the supply/demand on the platform.


Data not accessible to blink team, available only with your permission 

  • Sensitive data like transaction details are masked by default to all staff at blink. 

  • Your Customer Success Manager can access the information in case you opt-in to share it e.g., for support purposes.

Data access to blink 

  • AWS may provide access to the CTO upon request to provide access to production data. With approval from the CTO, DevOps Engineers may gain additional access if required for technical reasons. Everyone's access is audited by AWS following their globally defined standards. Customers can periodically request to see the AWS logs related to their data to learn if it was accessed and used safely.

Screenshot 2024-02-20 150221.png
Screenshot 2024-02-20 150214.png

Sharing Permissions

Data sharing permissions allow to set standards and easily amend access permissions for maximum safety and flexibility


Data sharing in your company 

  • Role-based access system gives the administrator of each company control over who has access to what data. Take the following examples: 

  • Sales role does not see service selection or operations platform by default, subject to change by admin. 

  • Operations role can be set up to have access to financially sensitive documents or not, subject to change by admin. 

Data sharing with other companies 

  • By default, you can choose to share your cargo needs and offers with everyone on the platform, only share it with a selected group of trusted partners or nobody. Data sharing is further limited, so that shared cargos cannot be browsed and become visible only to those chosen to see them on the platform with matching offers and needs. 

  • For your operations, you can use the Cargo Control Tower for trades completed on Trade Digital module or imported to the platform. It allows but doesn't require you to manage and share all or selected tasks and documents related to your cargo with your trade partner. 

  • At any time, you are under full control over the documents shared with counterparties. 


Data sharing with blink or 3rd parties 

  • Blink uses only pre-transaction data for monitoring and analytical purposes. Data related to properties added in the negotiation and transaction process are neither accessed by blink nor shared with 3rd parties, neither on individual nor aggregated basis. 

Third-Party Technology and Certifications



AWS Partner Network 

More than 90 percent of Fortune 100 companies and the majority of Fortune 500 companies utilize APN Partner solutions and services. Some of the world's biggest brands such as Netflix, Adobe, and BBC rely on it to fuel their top projects. 

Information security certification (ISO 27001) 

ISO 27001 implementation provides Blink with an Information Security Management System (ISMS), consisting of measures aimed at protecting information, against any threat, in such a way that we can ensure the continuity of the organization's activities,  minimize the damage that could be caused and maximize the return on invested capital.

  • Information security is based on ensuring three dimensions: 

  • Confidentiality: Ensure that information is only accessible to authorized users.

  • Integrity: Guarantee the accuracy and veracity of the information, controlling its processing methods.

  • Availability: Ensure authorized users have access when they need it.


Benefits of being ISO 27001 certified: 

  • Provides companies to correctly manage the security of their information, with international recognition, and accordingly to globally known and accepted standards.

  • It allows to know and analyze the risks of the organization, identifying threats, vulnerabilities and impacts on its business activity.

  • It allows to prevent, eliminate or effectively reduce the level of risks through the implementation of adequate controls, preparing for possible emergencies and guaranteeing business continuity.

  • It helps to plan, organize and structure the resources assigned to Information Security.

  • Define objectives and goals that increase the degree of confidence in your security.

  • Establishes processes and activities of review, continuous improvement and authorship of the management and treatment of information.

bottom of page