security banner-01.png

We pride ourselves on security and are a certified SOC 2 compliant company by the AICPA.  Below is information regarding a SOC 2 Audit: 

sec 3.jpg
 

The SOC 2 Report was specifically designed as a way to evaluate service organizations and determine if they are compliant with the principles of security, availability, processing integrity, confidentiality, and privacy. 

security icons-01.png

Processing Integrity

System processing is complete, valid, accurate, timely, and authorized.

security icons-02.png

Security

The system is protected against unauthorized physical and logical access.

security icons-03.png

Availability

The system is available for operation as use as agreed.

 
security icons-04.png

Confidentiality

Information designated as confidential is protected as agreed.

security icons-05.png

Privacy

Personal information is collected, used, retained, disclosed and destroyed with the commitments in the entity’s privacy notice and principles set forth by the AICPA.