Data protection, privacy, reliability and availability have always been core principles at Botsplash. We have always closely followed ISO 27001 controls and take pride in having our own in-house security engineer and penetration tester.
We are now thrilled to announce the completion of our Systems and Operations Controls SOC 2 Examination!
What is a SOC 2 Audit?
A SOC 2 examination is a widely recognized compliance audit conducted by independent auditors who validate the organization’s systems and controls which secure its customer data.
Our SOC 2 examination was guided by Databrackets and conducted by BRC (Bernard Robinson & Co.). The audit and reporting process is guided by a framework called the Trust Service Criteria, which is built upon five principles, as defined by the Association of International Certified Professional Accountants (AICPA):
Security – Information and systems are protected against unauthorized access, unauthorized disclosure of information, and damage to systems that could compromise the availability, integrity, confidentiality, and privacy of information or systems and affect the entity’s ability to achieve its objectives.
Availability – All information and computing systems are ready and available for operation at all times to meet the entity’s objectives.
Processing Integrity – All system processing is complete, accurate, valid, timely, and authorized to ensure that the entity meets its objectives.
Confidentiality – Any information designated as confidential remains secure to meet the entity’s objectives.
Privacy – All personal information collected, used, retained, stored, disclosed, or disposed of must meet the entity’s objectives.
This audit and reporting period included a thorough review of risk management, infrastructure, software development life cycle, information security, physical security, and company operations, just to name a few.
What does this mean for our customers?
This examination report highlights Botsplash’s adherence to one of the most ironclad industry standards for SaaS companies with regard to information security. Our organization, IT infrastructure, and risk management controls are properly designed and maintained with your best interests in mind.
The next cyber attack isn’t a matter of if, but when. As these attacks continue to evolve, you can rest assured that your data is protected and properly handled.
* Interested in a demo? Reach out to our Business Development Manager Willem Osuch *