Apollo privacy center
Apollo cares about your data privacy. Under data privacy or protection laws like the GDPR or CCPA, you have certain privacy rights. You can exercise some of those rights by following the instructions below.
Opt out of Apollo – object to our processing, opt out of sales, and request deletion of your profile
Want to opt out of Apollo by removing your existing individual profile from Apollo’s services and opting out of our use and sharing of it? Click the button below. If you make this choice, all information contained in your profile will be removed and your record will become unavailable in our products as soon as possible. We will maintain your information on a ”suppression” list to avoid reactivating your profile in the future.
Request access to collected data
Want to learn about the data Apollo has collected about you? Click the button below. Once we’ve verified your identity, you can specify the type of information you want, and we will send you a report.
Privacy at Apollo
For your reference, click these links to read our privacy policy and terms of use.
Audits & certifications
Apollo’s mission is to create the most trusted and intelligent data-first engagement platform. Our robust technology and systems ensure customer data is fully secure. Our security is certified by leading 3rd-party auditors based on the most widely recognized and internationally accepted information security standards.

ISO 27001
We are ISO 27001 certified by A-LIGN, a leading third party cybersecurity and compliance firm.

SOC-2
We are SOC-2 certified by A-LIGN, a leading third-party cybersecurity and compliance firm. Please contact our sales team for access to our complete SOC-2 Report.
ISO 27001 and SOC 2 certified
Certified by leading third-party cybersecurity auditors.
GDPR compliant
Compliant as both a Data Processor and Data Controller. Learn more about Apollo’s adherence to GDPR here.
Encryption in transit and at rest
Both idle and active data is encrypted over public networks and in our databases.
Database security
Databases are built with multi-layer security including encrypted passwords, two factor authentication, intrusion detection systems, and VPC with strict firewall settings.
Integrations security
Integrated SaaS Services are authorized securely with OAuth2 and credentials are not stored for those services.
Privacy & safety features
Custom control to enable or disable privacy-impacting features based on your needs.
Penetration testing
Annual network and graybox application penetration tests are performed by a certified third party consultant.
Internal and external audits
Audits are carried out, quarterly, on access control, risk, information security, IT infrastructure, and HR procedures.
Data recovery
Regular data backup with a maximum 24-hour RTO and RPO.