Delivering a highly available and secure conversation intelligence service is core to the Symbl.ai brand promise. As such, all our systems, controls and processes have always been designed with security and availability as critical design points. We have now gone one step further and are pleased to announce we have achieved SOC 2 Type II certification.
What Is SOC 2 Type II Certification?
SOC 2 is an information security compliance standard designed to test and demonstrate the cybersecurity of an organization. To get a SOC 2, companies must create a compliant cybersecurity program and complete an audit with an acredited CPA. The auditor reviews and tests the cybersecurity controls to the SOC 2 standard, and writes a report documenting their findings.
Here are a few examples of what you will find in the report:
- Symbl.ai security policies
- Symbl.ai encryption protocols for data at rest and in motion
- Symbl.ai logical and physical access controls
- Symbl.ai change management process
- Symbl.ai data backup and disaster recovery strategies
- Symbl.ai system monitoring, alerts and alarms
- Protecting the data and privacy of our customers is a non-negotiable aspect of what we do.
Our SOC 2 Type II certification provides additional assurance that we have all the right controls in place to protect your data and ensure the availability of our service.
To request a copy of Symbl’s SOC 2 Type II report, please email [email protected]
Learn about SOC 2
SOC (System and Organization Controls) is a voluntary compliance standard for service organizations. It was developed and is maintained by the American Institute of CPAs (AICPA), which specifies how organizations should manage customer data. The standard is based on the certain Trust Services Criteria: security, availability, processing integrity, confidentiality, privacy.
There are two types of SOC 2 reports. Type I describes an organization’s systems and whether the system design complies with the relevant trust principles. Type II details the operational efficiency of these systems.
Click here for an overview of Symbl’s other security, compliances and encryption practices.