SOC 2 defines how software-as-a-service companies must handle customers’ data.
SOC 2 isn’t a regulatory requirement. Any company choosing to become certified as SOC 2 compliance is demonstrating that it is committed to protection and control – because it wants to, not because it has to.
The protocol was established by the American Institute of Certified Public Accountants (AICPA) and is built on five trust principles:
⇨ Security—information and systems are protected against unauthorized access, unauthorized disclosure of information, and damage to systems that could compromise the availability, integrity, confidentiality, and privacy of information or systems and affect the entity’s ability to meet its objectives.
⇨ Availability—information and systems are available for operation and use to meet the entity’s objectives.
⇨ Processing integrity—system processing is complete, valid, accurate, timely, and authorized to meet the entity’s objectives.
⇨ Confidentiality—information designated as confidential is protected to meet the entity’s objectives.
⇨ Privacy—personal information is collected, used, retained, disclosed, and disposed to meet the entity’s objectives.
Click here to learn more about SOC 2.
Click here to request a copy of our most recent certification report.
You can be sure that your data will remain confidential with us.