Security at Compliable
Keeping Your Data Safe
We recognize that we’re dealing with the most private information there is and your company and its licensees can trust that we’re using the best possible tools, processes, and methods for ensuring the safety of your data.
Culture of Security
Our commitment to security permeates the organization. From application development to internal controls, our team cultivates security awareness.
- Security program inspired by NIST’s Cybersecurity Framework
- System development life cycle requiring changes to software to be peer-reviewed
- Information Assurance Group tasked with infosec, audit, and compliance
- Ubiquitous use of multifactor authentication
Data Protection
You trust us with your data, and we take that trust seriously. Everything is encrypted at rest and in transit. Granular use of encryption keys and associated access controls provide a depth of protection for your data.
- Security program inspired by NIST’s Cybersecurity Framework
- Industry standard strong encryption used throughout
- Data at rest is encrypted with unique keys for each document
Industry Best Practices
Security can be easy to get wrong and hard to get right. We follow industry guidance and best practices to confidently secure our product.
- SSL Labs rating of ‘A’1 . TLS is used for secure comms throughout
- Encrypted data is protected using the AES256 standard
- Completed licensing forms are ephemeral and deleted after use
- Two-factor authentication is provided for enhanced account security
- Role-based access controls partition application actions and data
More Information
If you have questions or need clarification, please reach out to our security team at security@compliable.com