Jiminny provides a cloud-based telephony service that as well as facilitating voice and video calls, utilising customer information from a CRM to intelligently log activity and process calls for the purpose of knowledge transfer and internal coaching.

We would like to make two things clear. First, we respect your privacy and take significant efforts to protect all your data. Second, we would never do anything with your data that we wouldn’t be proud to tell the world about.

Keeping our customers' data secure is the most important thing that Jiminny does. We go to considerable lengths to ensure that all data sent to Jiminny is handled securely - keeping Jiminny secure is fundamental to our business.

As you continue to learn more about Jiminny we recommend you also review our Terms of Use and Privacy Policy.


Key Takeaways

  • All of our services run in the cloud. Jiminny does not run our own routers, load balancers, DNS servers, or physical servers.
  • All of our services and data are hosted in Amazon Web Services (AWS) facilities in the USA. Jiminny services have been built with disaster recovery in mind.
  • Our infrastructure is spread across a minimum of 3 data centers (availability zones) and will continue to work should any one of those data centers fail unexpectedly.
  • For optimal performance, telephony and media streaming services are operated from 9 locations globally. Media content and web assets are served by content delivery network (CDN) from over 100 locations.
  • All of our servers are within our own virtual private cloud (VPC) with network access control lists (ACLs) that prevent unauthorized requests getting to our internal network.
  • Jiminny uses nightly snapshots from a hot standby to backup customer data.
  • All data is encrypted at rest and in transit.

AWS provides an extensive list of compliance and regulatory assurances, including SOC 1-3, and ISO 27001. See Amazon’s compliance and security documents for more information.

Service Levels

We are proud to maintain an uptime of 99.95% or higher. You can check our past stats on our status page.

Our telephony and video services are operated by Twilio, a leader in cloud-based telecommunications. Twilio have international reach, integrating with over 1000 carriers and are bound by a 99.95% uptime SLA. You can check this performance on their status page.


All customer data is stored in the USA.

Customer data is stored in multi-tenant datastores, we do not have individual datastores for each customer. However strict privacy controls exist in our application code to ensure data privacy and prevent one customer from accessing another customers data.

We have many unit and integration tests in place to ensure these privacy controls work as expected. These tests are run every time our codebase is updated and even one single test failing will prevent new code being shipped to production.

Data Transfer

All data sent to or from Jiminny is encrypted in transit using 256 bit encryption.

Media playback has additional layers of security to prevent sources being shared outside of the Jiminny platform. These include IP address restriction and time sensitive cookies scoped to each authenticated Jiminny user.

Our API and application endpoints are TLS/SSL only and score an "A+" rating on SSL Labs' tests. This means we only use strong cipher suites and have features such as HSTS and Perfect Forward Secrecy fully enabled.


Jiminny is served 100% over HTTPS. Jiminny runs a zero-trust corporate network. There are no corporate resources or additional privileges from being on Jiminny’s network.

We have two-factor authentication (2FA) and strong password policies on GitHub, Google, AWS, Twilio and Intercom to ensure access to third-party cloud services are protected.

Jiminny does not store passwords. Single sign-on (SSO) allows you to authenticate users in your existing systems without requiring them to enter login credentials to Jiminny. SSO support is available through GSuite, Office 365, and Salesforce.

Permissions and Access Control Policy

Jiminny enables permission levels to be set for any employees with access to our service.

Permissions and access can be set to include app settings, billing, user data, or the ability to listen back to recorded media.

Application Monitoring

  • On an application level, we produce audit logs for all activity, ship logs to Logentries for analysis, and use Amazon S3/Glacier for archival purposes.
  • All access to Jiminny applications is logged and audited.
  • Bastion hosts are used to login to devices.
  • All actions taken on production consoles or in the Jiminny application are logged.

Security Audits

We are in the process of signing a contract to engage with a well-regarded third-party auditor to annually audit our code-base, and work with them to resolve potential issues.

Audits are ongoing with technologies such as Logentries, AWS Cloudtrail and Security Monkey to provide an audit trail over our infrastructure and the Jiminny application. Auditing allows us to do ad-hoc security analysis, track changes made to our setup and audit access to every layer of our stack.


Jiminny, Inc. complies with the EU/Swiss-U.S. Privacy Shield Framework as set forth by the U.S. Department of Commerce regarding the collection, use, and retention of personal information from European Union member countries/Switzerland.

Jiminny, Inc. are working to comply with the Vendor Security Alliance (VSA) published best practices.

Did this answer your question?