Data Protection


At Champions, we care deeply about security โ€“ it’s our mission. If you have any questions or encounter issues, please contact us at

Product Security

Product security is essential at Champions. Through continuous integration, we rapidly respond to both functional and security issues. Our policies and procedures dictate when and how changes occur, adhering to DevOps security principles and development methodologies to achieve short resolution times for vulnerabilities.

Corporate Security

Champions leverages internal services requiring network access security, authenticating users via a central identity provider and employing two-factor authentication where possible. All personnel undergo regular security and privacy training, contributing to the protection of customer data and company assets.

Protection of Customer Data

Data submitted to Champions is confidential. It’s protected in transit and encrypted at rest. Customer Data is restricted from exiting the production environment, except under specific circumstances such as customer requests. Data Layer Security protects all data transmission between Champions and its users. Champions utilizes CSP data centers in the U.S., employing encryption at various points to safeguard Customer Data. Access to Customer Data is strictly limited and monitored, with robust authentication and authorization controls in place.

Compliance with Data Protection

Champions is committed to complying with the General Data Protection Regulation (GDPR). We continuously enhance our products, processes, and procedures to meet these regulations, ensuring continuous monitoring and conducting regular vulnerability testing. We’ve tailored our practices to meet GDPR general requirements. We recognize and respect the rights of our customers regarding their personal information.

Data Breach Notification

In the event of a data breach, Champions is dedicated to promptly informing affected customers and relevant authorities, as required by law. Our proactive approach to security aims to prevent breaches, and we’re committed to transparent and swift resolution should one occur.

Vendor Management

We utilize third-party applications and services, ensuring their controls align with our security expectations. Engagements assess technical, physical, and administrative controls to protect our information assets.


For security concerns, please report them to We maintain confidentiality and address issues promptly, requesting no public disclosure until resolved.