Compliance Statement

Last Updated: March 1, 2026

1. Overview

[Platform Name] is committed to maintaining the highest standards of security, privacy, and compliance. This document outlines our compliance posture with major regulations, standards, and frameworks relevant to our cybersecurity platform and our customers' needs.

2. Regulatory Compliance

2.1 General Data Protection Regulation (GDPR)

Status: Fully Compliant

The GDPR applies to all personal data of individuals in the European Economic Area (EEA). Our compliance measures include:

Requirement Implementation
Lawful Basis for Processing Contract performance, legitimate interests, consent
Data Subject Rights Automated portal for access, rectification, erasure, portability
Data Protection Officer Appointed and contactable at dpo@[platform].com
Breach Notification 72-hour notification capability
Data Processing Agreements Signed with all customers and sub-processors
International Transfers Standard Contractual Clauses (SCCs) in place
Privacy by Design Incorporated into SDLC and product design
Records of Processing Maintained and updated quarterly

Data Processing Addendum (DPA): Available upon request or at [platform].com/legal/dpa

2.2 California Consumer Privacy Act (CCPA) / California Privacy Rights Act (CPRA)

Status: Fully Compliant

The CCPA/CPRA applies to personal information of California residents. Our compliance includes:

Requirement Implementation
Right to Know Disclosure of categories and specific pieces collected
Right to Delete Process for verified deletion requests
Right to Opt-Out Do Not Sell My Personal Information link
Right to Correct Account settings and support process
Right to Limit Use of Sensitive PII Configurable data collection
Non-Discrimination No service denial for exercising rights

Do Not Sell My Personal Information: [platform].com/do-not-sell

2.3 Health Insurance Portability and Accountability Act (HIPAA)

Status: Business Associate Agreements Available

While our standard platform is not HIPAA-compliant by default, we offer:

Covered Components (with BAA):

Exclusions (without BAA):

2.4 Payment Card Industry Data Security Standard (PCI DSS)

Status: Compliant (Level 1 Service Provider)

Our PCI DSS compliance covers our payment processing environment:

Requirement Status Validation
Build and Maintain Secure Network ✅ Compliant Quarterly ASV scans
Protect Cardholder Data ✅ Compliant Encryption, tokenization
Maintain Vulnerability Management ✅ Compliant Weekly scans, annual pen tests
Implement Strong Access Control ✅ Compliant MFA, least privilege
Regularly Monitor and Test ✅ Compliant Continuous monitoring
Maintain Information Security Policy ✅ Compliant Annual review

Note: We use PCI-compliant third-party payment processors. We do not store full PAN data.

2.5 Gramm-Leach-Bliley Act (GLBA)

Status: Compliance Support Available

For financial institutions subject to GLBA, our platform supports:

3. Security Framework Compliance

3.1 ISO/IEC 27001:2022

Status: Certified

We are certified against ISO/IEC 27001:2022, the international standard for information security management.

3.2 SOC 2 Type II

Status: Audited Annually

We undergo annual SOC 2 Type II audits covering the Trust Services Criteria:

Criteria Status Description
Security ✅ Audited System protected against unauthorized access
Availability ✅ Audited System available for operation and use
Processing Integrity ✅ Audited System processing complete, valid, accurate
Confidentiality ✅ Audited Confidential information protected
Privacy ✅ Audited Personal information collected, used, retained, disclosed

SOC 3 Report: Available publicly at [platform].com/security/soc3
SOC 2 Report: Available under NDA to customers

3.3 NIST Cybersecurity Framework (CSF)

Status: Mapped and Aligned

Our security program is mapped to the NIST CSF:

Function Implementation
Identify Asset management, risk assessment, governance
Protect Access control, data security, awareness training
Detect Continuous monitoring, anomaly detection
Respond Incident response plan, communication, analysis
Recover Recovery planning, improvements, communication

3.4 CIS Controls

Status: Implemented (Level 2)

We have implemented CIS Critical Security Controls:

Control Category Implementation Level
1: Inventory and Control of Enterprise Assets Level 2
2: Inventory and Control of Software Assets Level 2
3: Data Protection Level 2
4: Secure Configuration Level 2
5: Account Management Level 2
6: Access Control Management Level 2
7: Continuous Vulnerability Management Level 2
8: Audit Log Management Level 2
9: Email and Web Browser Protections Level 2
10: Malware Defenses Level 2
11: Data Recovery Level 2
12: Network Infrastructure Management Level 2
13: Network Monitoring and Defense Level 1
14: Security Awareness and Skills Training Level 2
15: Service Provider Management Level 2
16: Application Software Security Level 2
17: Incident Response Management Level 2
18: Penetration Testing Level 2

4. Regional Compliance

4.1 United States

Regulation Applicability Status
CCPA/CPRA California residents Compliant
NYDFS New York financial services Compliant for covered customers
Massachusetts 201 CMR 17.00 Personal information Compliant
State Breach Notification Laws All states Notification process in place

4.2 European Union

Regulation Applicability Status
GDPR EU residents Compliant
ePrivacy Directive Electronic communications Compliant
NIS Directive Essential services Support for customers

4.3 United Kingdom

Regulation Applicability Status
UK GDPR UK residents Compliant
Data Protection Act 2018 UK data protection Compliant

4.4 Canada

Regulation Applicability Status
PIPEDA Canadian residents Compliant
CASL Commercial electronic messages Compliant

4.5 Asia Pacific

Region Regulation Status
Australia Privacy Act 1988 (APP) Compliant
Japan APPI Compliant
Singapore PDPA Compliant
South Korea PIPA Compliant with local partners

5. Industry-Specific Compliance

5.1 Federal Risk and Authorization Management Program (FedRAMP)

Status: In Process / Authorized (as applicable)

We are:

If authorized: Our FedRAMP package is available at [FedRAMP Marketplace link]

5.2 Federal Information Security Modernization Act (FISMA)

Status: Support Available

For federal customers requiring FISMA compliance, we provide:

5.3 Cybersecurity Maturity Model Certification (CMMC)

Status: Support Available

For defense industrial base customers requiring CMMC:

6. Certifications and Attestations

Certification Status Valid Through Scope
ISO 27001:2022 ✅ Certified [Date] ISMS
ISO 27017 ✅ Certified [Date] Cloud Security
ISO 27018 ✅ Certified [Date] PII Protection
SOC 2 Type II ✅ Audited [Date] Security, Availability, Confidentiality
SOC 3 ✅ Published [Date] Public Report
PCI DSS Level 1 ✅ Compliant [Date] Payment Processing
Cyber Essentials Plus ✅ Certified [Date] UK Government
CSA STAR ✅ Level 2 [Date] Cloud Security Alliance

7. Compliance Documentation

The following documents are available to customers under NDA:

Document Availability
SOC 2 Type II Report Upon request with NDA
ISO 27001 Certificate Public
Penetration Test Summary Upon request
Business Continuity Plan Summary Upon request
Data Processing Agreement Public
HIPAA Business Associate Agreement Upon request
Vendor Security Questionnaire Responses Upon request
Subprocessor List Public

8. Audit Rights

8.1 Customer Audits

Customers may request:

Process:

  1. Submit request to compliance@[platform].com
  2. Sign non-disclosure agreement (if required)
  3. Schedule review within 30 days
  4. Limited to one request per 12 months

8.2 On-Site Audits

On-site audits are generally not permitted but may be considered for:

9. Breach Notification

9.1 Notification Timeline

Jurisdiction Requirement Our Commitment
GDPR 72 hours ✅ Within 48 hours
CCPA Without unreasonable delay ✅ Within 72 hours
PCI DSS Immediately ✅ Within 24 hours
General Customers Reasonable ✅ Within 72 hours

9.2 Notification Process

In the event of a data breach affecting your data, we will:

  1. Notify your designated security contact
  2. Provide details of the breach and affected data
  3. Describe our response and containment
  4. Provide regular updates on investigation
  5. Assist with regulatory reporting requirements

10. Compliance Contact

Report Compliance Concern: [platform].com/compliance/report