We recognize the importance of maintaining the confidentiality, integrity, and availability of our clients’ data and the protection of their valuable business assets and applications. Our Trust Center reflects our commitment to providing a secure environment and adopting effective security standards that exceed industry best practices in the areas of information security and compliance.
With a variety of reliable security technologies, as well as a unique combination of trained personnel, mature business processes, and regular third-party audits measured against several international and U.S. standards, we deliver a high level of security and confidence that is unmatched in the industry.
Our Trust Center describes each layer of this assurance approach to provide an overview of the compliance, data protection, and cybersecurity that we provide.
We maintain controls that support an industry-recognized framework to ensure due care and due diligence in maintaining our Information Security Program.
Our information security framework is detailed into five (5) categories of controls that include: Identify, Protect, Detect, Respond, Recover.
We consider these controls as foundational for effective information security and privacy.
Our information security controls focus on implementing the appropriate safeguards to ensure the safe functionality of systems, applications, and services.
These controls focus on situational awareness to ensure the timely identification and response to potential information security or privacy incidents.
These controls focus on the processes used to act when an information security or privacy event is detected.
These controls focus on restoring capabilities or services that were impaired during an incident.
To assure that our clients’ data confidentiality, integrity, and availability are maintained, we conduct multiple internal audits and third-party audits on a scheduled basis. The written results of many of these audits are available on request.
The following table shows the types of audits and scans, plus the frequency in which they are conducted: