Compliances

Compliance Logo

SOC 2

Compliant

Trusted by

Trusted By Company Logo
Trusted By Company Logo
Trusted By Company Logo
Trusted By Company Logo

Controls

Continuously monitored

Data security

Identify Validation

Termination of Employment

Multi-factor Authentication

Network security

Limit Network Connections

External System Connections

Transmission Confidentiality

App security

Conspicuous Link To Privacy Notice

Approval of Changes

Endpoint security

Malicious Code Protection (Anti-Malware)

Full Device or Container-based Encryption

Endpoint Security Validation

Corporate security

Code of Business Conduct

Organizational Structure

Roles & Responsibilities

Resources

SOC 3

Document

Subprocessors

Subprocessor Logo

AWS

IT infrastructure

Subprocessor Logo

Userlist

Marketing

Subprocessor Logo

GitHub

Development software

Subprocessor Logo

Stripe

Finance

Subprocessor Logo

Gitlab

Development software