Compliance and data security

SOC 2 Type II certified

Trustate has successfully completed Type 2 Service Organization Control 2 (SOC 2 Type II) examinations, receiving certification from an independent auditor.

We are committed to stringent information security policies and procedures.

What is SOC 2 Type II ?

Independent Audit

The Type II report, which Trustate has successfully obtained, involves a rigorous and detailed examination by an independent auditor over an extended period. This means the auditor assesses not only the adequacy of our system design but also the operational effectiveness of those systems consistently over time.

For Cloud-based Storage

SOC 2 Type II is specifically designed for service providers storing customer data in the cloud, making it particularly relevant in today’s digital age. This standard uses criteria known as Trust Services Criteria—security, availability, processing integrity, confidentiality, and privacy.

Commitment to Compliance

What sets the SOC 2 Type II apart is its requirement for ongoing compliance, rather than just a snapshot of compliance at a single point in time. It requires regular follow-up audits to ensure continued adherence to these high standards.

Actively Monitored Security

Receiving this certification means Trustate's security measures and controls have been thoroughly vetted and are actively monitored and updated to address emerging threats and vulnerabilities.

Data Protection & Encryption

This continuous improvement mindset helps provide peace of mind to our customers, knowing that their data is protected by a system that meets rigorous, industry-recognized standards.

Data At Rest

Trustate uses the Advanced Encryption Standard (AES) with 256-bit encryption for all stored data, employing the same robust security measures as U.S. financial institutions.

Data In Motion

Trustate secures data transfers with the Transport Layer Security (TLS) 1.2 encryption protocol. This cryptographic protocol ensures the secure transmission of data over the internet and authenticates our website’s identity.

Data Stored In the Cloud

Trustate’s platform stores your documents in ISO 27018-certified data centers, which adhere to stringent controls and guidelines for protecting Personally Identifiable Information (PII) in the cloud. This certification confirms that our systems have been independently verified for data security.

Data Ownership

Your trust in Trustate to protect your personal information is something we deeply value. We commit never to share, sell, or transfer your data without your explicit consent, except as explicitly outlined in our privacy policy. Please visit our Privacy Policy to learn more.

COMPLIANCE & DATA SECURITY

Frequently Asked Questions

Does Trustate require Multi-Factor Authentication (MFA)?
How secure is the software platform?
Can I share my account with a colleague?
What if I suspect a security issue?