Last Updated: March 1, 2026
[Platform Name] is committed to maintaining the highest standards of security, privacy, and compliance. This document outlines our compliance posture with major regulations, standards, and frameworks relevant to our cybersecurity platform and our customers' needs.
Status: Fully Compliant
The GDPR applies to all personal data of individuals in the European Economic Area (EEA). Our compliance measures include:
| Requirement | Implementation |
|---|---|
| Lawful Basis for Processing | Contract performance, legitimate interests, consent |
| Data Subject Rights | Automated portal for access, rectification, erasure, portability |
| Data Protection Officer | Appointed and contactable at dpo@[platform].com |
| Breach Notification | 72-hour notification capability |
| Data Processing Agreements | Signed with all customers and sub-processors |
| International Transfers | Standard Contractual Clauses (SCCs) in place |
| Privacy by Design | Incorporated into SDLC and product design |
| Records of Processing | Maintained and updated quarterly |
Data Processing Addendum (DPA): Available upon request or at [platform].com/legal/dpa
Status: Fully Compliant
The CCPA/CPRA applies to personal information of California residents. Our compliance includes:
| Requirement | Implementation |
|---|---|
| Right to Know | Disclosure of categories and specific pieces collected |
| Right to Delete | Process for verified deletion requests |
| Right to Opt-Out | Do Not Sell My Personal Information link |
| Right to Correct | Account settings and support process |
| Right to Limit Use of Sensitive PII | Configurable data collection |
| Non-Discrimination | No service denial for exercising rights |
Do Not Sell My Personal Information: [platform].com/do-not-sell
Status: Business Associate Agreements Available
While our standard platform is not HIPAA-compliant by default, we offer:
Covered Components (with BAA):
Exclusions (without BAA):
Status: Compliant (Level 1 Service Provider)
Our PCI DSS compliance covers our payment processing environment:
| Requirement | Status | Validation |
|---|---|---|
| Build and Maintain Secure Network | ✅ Compliant | Quarterly ASV scans |
| Protect Cardholder Data | ✅ Compliant | Encryption, tokenization |
| Maintain Vulnerability Management | ✅ Compliant | Weekly scans, annual pen tests |
| Implement Strong Access Control | ✅ Compliant | MFA, least privilege |
| Regularly Monitor and Test | ✅ Compliant | Continuous monitoring |
| Maintain Information Security Policy | ✅ Compliant | Annual review |
Note: We use PCI-compliant third-party payment processors. We do not store full PAN data.
Status: Compliance Support Available
For financial institutions subject to GLBA, our platform supports:
Status: Certified
We are certified against ISO/IEC 27001:2022, the international standard for information security management.
Status: Audited Annually
We undergo annual SOC 2 Type II audits covering the Trust Services Criteria:
| Criteria | Status | Description |
|---|---|---|
| Security | ✅ Audited | System protected against unauthorized access |
| Availability | ✅ Audited | System available for operation and use |
| Processing Integrity | ✅ Audited | System processing complete, valid, accurate |
| Confidentiality | ✅ Audited | Confidential information protected |
| Privacy | ✅ Audited | Personal information collected, used, retained, disclosed |
SOC 3 Report: Available publicly at [platform].com/security/soc3
SOC 2 Report: Available under NDA to customers
Status: Mapped and Aligned
Our security program is mapped to the NIST CSF:
| Function | Implementation |
|---|---|
| Identify | Asset management, risk assessment, governance |
| Protect | Access control, data security, awareness training |
| Detect | Continuous monitoring, anomaly detection |
| Respond | Incident response plan, communication, analysis |
| Recover | Recovery planning, improvements, communication |
Status: Implemented (Level 2)
We have implemented CIS Critical Security Controls:
| Control Category | Implementation Level |
|---|---|
| 1: Inventory and Control of Enterprise Assets | Level 2 |
| 2: Inventory and Control of Software Assets | Level 2 |
| 3: Data Protection | Level 2 |
| 4: Secure Configuration | Level 2 |
| 5: Account Management | Level 2 |
| 6: Access Control Management | Level 2 |
| 7: Continuous Vulnerability Management | Level 2 |
| 8: Audit Log Management | Level 2 |
| 9: Email and Web Browser Protections | Level 2 |
| 10: Malware Defenses | Level 2 |
| 11: Data Recovery | Level 2 |
| 12: Network Infrastructure Management | Level 2 |
| 13: Network Monitoring and Defense | Level 1 |
| 14: Security Awareness and Skills Training | Level 2 |
| 15: Service Provider Management | Level 2 |
| 16: Application Software Security | Level 2 |
| 17: Incident Response Management | Level 2 |
| 18: Penetration Testing | Level 2 |
| Regulation | Applicability | Status |
|---|---|---|
| CCPA/CPRA | California residents | Compliant |
| NYDFS | New York financial services | Compliant for covered customers |
| Massachusetts 201 CMR 17.00 | Personal information | Compliant |
| State Breach Notification Laws | All states | Notification process in place |
| Regulation | Applicability | Status |
|---|---|---|
| GDPR | EU residents | Compliant |
| ePrivacy Directive | Electronic communications | Compliant |
| NIS Directive | Essential services | Support for customers |
| Regulation | Applicability | Status |
|---|---|---|
| UK GDPR | UK residents | Compliant |
| Data Protection Act 2018 | UK data protection | Compliant |
| Regulation | Applicability | Status |
|---|---|---|
| PIPEDA | Canadian residents | Compliant |
| CASL | Commercial electronic messages | Compliant |
| Region | Regulation | Status |
|---|---|---|
| Australia | Privacy Act 1988 (APP) | Compliant |
| Japan | APPI | Compliant |
| Singapore | PDPA | Compliant |
| South Korea | PIPA | Compliant with local partners |
Status: In Process / Authorized (as applicable)
We are:
If authorized: Our FedRAMP package is available at [FedRAMP Marketplace link]
Status: Support Available
For federal customers requiring FISMA compliance, we provide:
Status: Support Available
For defense industrial base customers requiring CMMC:
| Certification | Status | Valid Through | Scope |
|---|---|---|---|
| ISO 27001:2022 | ✅ Certified | [Date] | ISMS |
| ISO 27017 | ✅ Certified | [Date] | Cloud Security |
| ISO 27018 | ✅ Certified | [Date] | PII Protection |
| SOC 2 Type II | ✅ Audited | [Date] | Security, Availability, Confidentiality |
| SOC 3 | ✅ Published | [Date] | Public Report |
| PCI DSS Level 1 | ✅ Compliant | [Date] | Payment Processing |
| Cyber Essentials Plus | ✅ Certified | [Date] | UK Government |
| CSA STAR | ✅ Level 2 | [Date] | Cloud Security Alliance |
The following documents are available to customers under NDA:
| Document | Availability |
|---|---|
| SOC 2 Type II Report | Upon request with NDA |
| ISO 27001 Certificate | Public |
| Penetration Test Summary | Upon request |
| Business Continuity Plan Summary | Upon request |
| Data Processing Agreement | Public |
| HIPAA Business Associate Agreement | Upon request |
| Vendor Security Questionnaire Responses | Upon request |
| Subprocessor List | Public |
Customers may request:
Process:
On-site audits are generally not permitted but may be considered for:
| Jurisdiction | Requirement | Our Commitment |
|---|---|---|
| GDPR | 72 hours | ✅ Within 48 hours |
| CCPA | Without unreasonable delay | ✅ Within 72 hours |
| PCI DSS | Immediately | ✅ Within 24 hours |
| General Customers | Reasonable | ✅ Within 72 hours |
In the event of a data breach affecting your data, we will:
Report Compliance Concern: [platform].com/compliance/report