Frequently answered questions

Here you will find answers to some of the most frequent questions. Remember to check our help center for product related guides or contact us directly for more information.


Can we use a pricing based on number of sites instead of users?

Yes, we can make your organisation a tailored offer based on the number of sites instead of users. Contact us with a detailed description of your needs and our sales team will be in touch with you shortly.

Are there any restrictions for the number of conducted audits or audit templates in Falcony | Audit?

As a default, there aren't any limitations to the number of audits your organisation can conduct within a certain time frame. The same goes for the number of audit templates. However the onboarding packages have limitations on the number of audit templates we setup for you.

Are there any restrictions for the number of observations or forms in Falcony | Observe?

As a default, there aren't any limitations to the number of observations your organisation can report within a certain time frame. The same goes for the number of observation forms (or categories like we call them). However the onboarding packages have limitations on the number of observation categories we setup for you.

Can we pay with credit card?

Unfortunately, we do not accept credit card payments at this point. All license fees are billed 12 months at a time in advance and the invoices are sent either as PDF's via email or in electronic format.

Can we test the the platform before making a purchase decision?

Of course. We offer a free 30-day trial so that you can take your time testing the platform before making any decisions. Fill in the required information here to get started.

What kind of integrations do you offer?

We offer a wide range of integrations such as SSO integrations, BI tool integrations, document management system integrations and insurance company integrations. Please contact us for more information.


How do you secure customers' data?

The security protections and control processes are there to ensure a secure environment for our customers' information. Navigate to the security section on this page to read more about our security practices and protocols.

How does your platform take privacy into account?

From transparent logs to auto-deleted attachment and personal data fields, we have developed multiple features to help our customers comply with data protection regulation.

Do you retain customers' data after a contract is terminated?

Yes, we retain our customers' data for 180 days after a contract has been terminated. During this time period, the customer can request a data handoff.

Can you provide assist in personal data requests that relate to your platform?

Yes we can. In cases where our customers receive requests from data subjects to export, correct, amend or delete personal data, we assist named administrators to respond to such requests.

Do you have all required subprocessor DPA's in place?

Yes, we have signed Data Processing Agreements (DPA's) with all of our subprocessors. You can view them here.


How do you encrypt customers' data?

All data in our products is encrypted at rest and in transit. Our products support TLS 1.2 and TLS 1.1 protocols for encrypting communications. The data at rest is encrypted with AES-256, block-level storage encryption.

Where do you host customers' data?

Data is hosted in the European data centers of Amazon Web Services that have been certified as ISO 27001, PCI DSS Service Provider Level 1, and/or SOC 2 compliant.

What kind of backups and monitoring do you have in place?

Automatic backups of databases are taken daily, weekly, and monthly. We also keep a version history for all successful database transactions.

What kind of internal security measures do you have in place?

Some of our internal security measures include annual security and awareness training for all employees, internal security audits and portable device security management.

How do you respond to possible security incidents?

Our protocol for handling security incidents include escalation procedures, rapid mitigation and post mortems. All employees are informed of our policies.

Is there a document you could share about the security of your cloud services?

There is a document available upon request. Please send us an email at with the headline "Security and data protection of Falcony cloud services" and we will send the document to you.