Security is key and we know it

All Snip features are created with your privacy and security ahead. This means that we cover everything from technical issues to human mistakes.

People sitting using Snip and sharing information securely.

See how it works

  • Icon of a smatphone near the planet Earth.

    Snip protects your data

    Snip’s server infrastructure is hosted on Amazon Web Services. The AWS compliance program is designed to follow international security standards and regulations, protecting data confidentiality and privacy. Data centers provide the means necessary to operate 24/7 and protect data from physical damage and network problems.

  • Icon of a smartphone next to a shield.

    Data encryption

    Security starts with your password. It is used to encrypt your data, so no one but you can read it. It is also used to decrypt your data when you need it. Your password will never be shared with anyone, which means that you are the only person who can unlock your data on Snip and access your information.

  • Icon of a notebook next to a document on a sheet of paper.

    Privacy and security program

    We have established an information security management framework, helping us to ensure that you are confident with Snip by hosting your documents as if they were stored locally on your own network. This is done by analyzing the risks and continuously improving the security, confidentiality, integrity and availability of the service.

  • Icon fo a document on a sheet of paper on top of a cloud.

    Backup and recovery policy

    User data is stored in the failover cluster with a backups. No matter what happens, your work will remain safe. Even if you accidentally delete a collection, there is always a way back: we keep backup copies of deleted panels for 30 days.

  • Icon of a smartphone displaying a key.

    Private data

    Snip was designed with a deep respect for your privacy. All information you share with us is used only to provide services and support. Snip has access only to your account name, your email address and some necessary non-invasive information. Snip DOES NOT have access to any personal content.

  • Icon of a notebook next to two gears.

    Instant notification monitoring

    We work with a consistent history of uptime, using a reliable monitoring system, ensuring that members of our team are instantly notified of all possible security risks. We are constantly maintaining the level of excellence and counting on world-renowned partners for support.

  • Icon of a sheet of paper showing a padlock.


    Snip was designed within the requirements developed by LGPD and GDPR. You can learn more about our privacy practices in the Privacy Policy, as well as better understand Sonata's role on compliance.

We are committed to protecting your data