Founded in 2023

Compliances

Compliance Logo

SOC 2

Compliant

Compliance Logo

ISO 27001

Compliant

Controls

Data security

Termination of Employment

Multi-factor Authentication

Encrypting Data At Rest

Network security

Limit Network Connections

External System Connections

Transmission Confidentiality

App security

Conspicuous Link To Privacy Notice

Approval of Changes

Endpoint security

Malicious Code Protection (Anti-Malware)

Full Device or Container-based Encryption

Endpoint Security Validation

Corporate security

Code of Business Conduct

New Hire Policy Acknowledgement

Security & Privacy Awareness

Resources

Data Protection Policy

Policy

ISMS Information Security Roles & Responsibilities

Policy

ISMS Manual

Policy

ISMS Scope Document

Policy

Privacy By Design Policy

Policy