SOC 2 compliance is a critical security initiative and an important milestone for CData. SOC 2 compliance comes in two forms: A SOC 2 Type 1 report describes the design of a service provider’s system controls to meet relevant trust criteria as of a specific point in time, while a SOC 2 Type 2 report details the operational effectiveness of those systems controls to perform as designed over a specified period of time. Service providers like CData voluntarily undergo a rigorous audit and assessment to ensure their security controls meet AICPA’s Trust Services Criteria, which include: A SOC 2 report is often the primary document that security departments rely on to assess a vendor’s ability to maintain adequate security. System and Organization Controls (SOC) 2 is a widely recognized security standard developed by the AICPA that specifies how organizations should manage customer data. To request a copy of the SOC 2 report, please contact your dedicated account representative, or email What is SOC 2 Compliance? The report covers CData Connect Cloud, CData Connect Server, CData Drivers, CData Sync, and CData Arc. The audit, performed by LBMC, reviewed CData’s controls related to security, availability, processing integrity, and confidentiality based on the Trust Services Criteria (TSC) of the American Institute of Certified Public Accountants (AICPA). This major milestone reflects CData’s commitment to protecting our users’ data by implementing rigorous, enterprise-level security measures. We are pleased to announce that CData is officially SOC 2 compliant. | NovemAnnouncing SOC 2 Certification: CData Continues our Commitment to Data Security
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |