Publishers are collecting more direct visitor data as third-party cookies disappear. Email addresses, phone numbers, geographic information, and behavioral data flow into platforms like Admiral through pop-ups, giveaways, and newsletter signups. This shift from anonymous tracking to direct data collection creates new responsibilities for newsrooms: you need to understand what security controls protect visitor information, how platforms handle privacy compliance, and what risks you’re accepting when you implement these tools.
What do 1,000 journalists and PR pros know about AI that you don't? They took AI Quick Start, a 1-hour live class from The Media Copilot. 94% satisfaction. Find out how to work smarter with AI in just 60 minutes. Get 20% off with the code AIPRO: https://mediacopilot.ai/
Key Takeaways
- Publishers using Admiral inherit new data-protection responsibilities.
- Encryption and certifications are SaaS-standard; compliance is on the publisher.
- Audit retention, sub-processors and breach terms before trusting it with PII.
Admiral positions itself as a privacy-first platform, emphasizing its status as one of the first IAB– and Google-certified Consent Management Platforms. For small newsrooms without dedicated security teams, understanding what these controls actually protect—and what they don’t—matters when evaluating whether Admiral meets your compliance and risk management requirements.
Here’s what you need to know about Admiral’s security posture, the controls the platform has implemented, and what you should verify before trusting Admiral with visitor data. (See also: Why newsrooms choose Admiral for first-party data collection)
What security controls Admiral uses
Admiral builds privacy considerations into product development from the start—what’s called privacy-by-design. The company conducts privacy impact assessments during development cycles to identify potential compliance issues before features launch. This approach aligns with GDPR and CCPA requirements that mandate privacy considerations throughout the data lifecycle.
The platform’s IAB and Google CMP certification means it has passed third-party audits verifying compliance with consent framework standards. This matters for publishers operating in jurisdictions with strict privacy regulations. However, certification doesn’t eliminate all privacy risks—you remain responsible for how you configure and use the platform.
Encryption and access controls
Admiral uses industry-standard encryption protocols for data protection:
- Data in transit: All data transmission over the public internet requires Transport Layer Security (TLS 1.2 or later), which protects visitor data from interception during transfer between browsers and Admiral’s servers.
- Data at rest: Information stored in Admiral’s databases is encrypted even if physical storage media is compromised.
- Access restrictions: Only people and systems with a clear business need can access customer data, following least-privilege principles.
- Data segregation: Your visitor data cannot be accessed by other publishers or shared with third parties.
Admiral’s development process includes code review requirements, with all changes reviewed by at least two developers before deployment. The platform also uses automated security scanning for static analysis and vulnerability detection.

Heavy reliance on Zapier
Admiral’s integration architecture relies heavily on Zapier for connecting with email service providers, CRM platforms, and analytics tools. Each integration point represents a potential vulnerability where data could be exposed if Zapier or connected systems are compromised. If you use Admiral’s Zapier integrations, verify that all connected systems meet your security and compliance requirements.
The data residency question
Admiral doesn’t publicly specify where visitor data is stored geographically or whether you can choose data residency locations. This matters if you’re subject to GDPR, which requires that personal data of EU residents be stored and processed in accordance with strict rules about international data transfers. If you operate in multiple jurisdictions or serve international audiences, ask Admiral directly whether data residency options are available.
What “standard” security means
Admiral’s security controls are standard for cloud-based SaaS platforms handling personal information, but they’re not unusually rigorous compared to enterprise customer data platforms. If you have highly sensitive data, regulatory requirements beyond GDPR and CCPA, or strict security mandates, Admiral’s controls may be insufficient for your needs.
The platform’s privacy-by-design approach and IAB/Google certification provide reassurance, but they don’t eliminate your responsibility for data protection. You remain the data controller under GDPR and must ensure your use of the platform complies with privacy regulations. This includes properly configuring consent mechanisms, providing clear privacy notices to visitors, honoring data subject rights requests, and maintaining records of processing activities.
Security checklist before implementing Admiral
Verify these items before trusting Admiral with visitor data:
- Does your organization require SOC 2 Type II compliance? Confirm Admiral maintains current certification.
- Do you handle data subject to GDPR or CCPA? Verify Admiral can meet your specific regulatory requirements.
- Do you need data residency in specific geographic regions? Confirm whether Admiral offers data location controls.
- Are you subject to industry-specific regulations like HIPAA or FERPA? Verify Admiral supports required compliance frameworks.
- Do you require custom data processing agreements? Confirm Admiral can accommodate your legal requirements.
- Do you integrate Admiral with third-party systems via Zapier? Audit all connected systems for security and compliance.
- Do you have internal requirements for penetration testing or security audits? Confirm Admiral can provide necessary documentation.
What to do next
Contact Admiral directly to request specific compliance certifications relevant to your jurisdiction and industry. Involve your legal and information security teams in the evaluation process. If you have complex regulatory requirements, request custom data processing agreements before implementation.







