
Legal & Compliance
Protecting your information
Most companies try to hide what they do and how they treat your data behind legal mumbo jumbo. We take a different approach. Our mission is to keep people safe and secure — this applies to your personal information, too. We created this page to help you understand how we deal with privacy and security, and your rights and responsibilities when you use our service.
Introduction
To help you with compliance and reporting, Lookout shares information, best practices, access to certification information. Our organization regularly undergoes independent verification of security, privacy, and compliance controls, achieving certifications against global standards to earn and keep your trust.
Lookout maintains an extensive policies and procedures library to satisfy the requirements of the ISO/IEC 27000 series, FedRAMP, domestic and global legal and regulatory requirements as well as Customer commitments.
The International Organization for Standardization (ISO) is an independent, non-governmental international organization with an international membership of over 163 national standards bodies.
ISO/IEC 27018 relates to one of the most critical components of cloud privacy: the protection of personally identifiable information (PII).
The ISO/IEC 27017:2015 gives guidance for information security controls applicable to the provision and use of cloud services by providing additional implementation guidance for 37 relevant controls specified in ISO/IEC 27002.
Businesses, government and non-profit organizations as well as individuals depend on Lookout to secure their mobile devices and protect them from phishing attacks.
The U.S. Federal Government established the Federal Risk and Authorization Management Program (FedRAMP), a government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services.
he Cloud Security Alliance is a non-profit organization whose mission is to “promote the use of best practices for providing security assurance within Cloud Computing and provide education on the uses of Cloud Computing to help secure all other forms of computing.”