StreamText is focused on ensuring your data is protected. We support a SOC 2® framework to ensure that we follow industry best practices for managing our application and your data. As a part of an ongoing effort, we are excited to announce that we’ve successfully completed our SOC 2 report.
What is the SOC 2 Report?
SOC 2 compliance is a standardized framework for organizations to demonstrate their commitment to data security and privacy. Developed by the American Institute of Certified Public Accountants, companies can earn a SOC 2 certification by passing an independent audit that evaluates how they manage and store customer information. The StreamText examination was conducted by A-LIGN, a technology-enabled security and compliance firm trusted by more than 4,000 global organizations to help mitigate cybersecurity risks.
The SOC 2 audit testing framework is based on the Trust Services Criteria (TSC), which are used to identify various points of focus an organization should consider addressing. Based on the TSCs, the third-party compliance and audit firm (in our case, A-LIGN) evaluates whether the organization has the appropriate policies, procedures, and controls in place to manage the identified points of focus effectively.
To become SOC 2 compliant, vendors must meet specific requirements in one or more Trust Services Criteria (TSC). These categories are:
- Security: The vendor’s level of protection against unauthorized access.
- Availability: The accessibility and usability of their platform, namely uptime.
- Processing Integrity: The performance of their platform and accuracy of the data stored.
- Confidentiality: The vendor’s ability to protect sensitive data and restrict access to specific users.
- Privacy: The vendor’s ability to secure personally identifiable information.
Your data is safe and secure with StreamText
We use the latest in encryption technology, TLS 1.2, for all communications. All data is encrypted and protected at rest and during transmission. StreamText also uses weekly scans and annual penetration tests for vulnerabilities. These reports can be provided to our clients under NDA.
We hope the steps we have taken help you remain confident in knowing that your data is secure with StreamText. To learn more about our security policies and initiatives, please contact us at email@example.com.