
Trustate has successfully completed Type 2 Service Organization Control 2 (SOC 2 Type II) examinations, receiving certification from an independent auditor.
We are committed to stringent information security policies and procedures.
The Type II report, which Trustate has successfully obtained, involves a rigorous and detailed examination by an independent auditor over an extended period. This means the auditor assesses not only the adequacy of our system design but also the operational effectiveness of those systems consistently over time.
SOC 2 Type II is specifically designed for service providers storing customer data in the cloud, making it particularly relevant in today’s digital age. This standard uses criteria known as Trust Services Criteria—security, availability, processing integrity, confidentiality, and privacy.
What sets the SOC 2 Type II apart is its requirement for ongoing compliance, rather than just a snapshot of compliance at a single point in time. It requires regular follow-up audits to ensure continued adherence to these high standards.
Receiving this certification means Trustate's security measures and controls have been thoroughly vetted and are actively monitored and updated to address emerging threats and vulnerabilities.
This continuous improvement mindset helps provide peace of mind to our customers, knowing that their data is protected by a system that meets rigorous, industry-recognized standards.
Trustate uses the Advanced Encryption Standard (AES) with 256-bit encryption for all stored data, employing the same robust security measures as U.S. financial institutions.
Trustate secures data transfers with the Transport Layer Security (TLS) 1.2 encryption protocol. This cryptographic protocol ensures the secure transmission of data over the internet and authenticates our website’s identity.
Trustate’s platform stores your documents in ISO 27018-certified data centers, which adhere to stringent controls and guidelines for protecting Personally Identifiable Information (PII) in the cloud. This certification confirms that our systems have been independently verified for data security.
Your trust in Trustate to protect your personal information is something we deeply value. We commit never to share, sell, or transfer your data without your explicit consent, except as explicitly outlined in our privacy policy. Please visit our Privacy Policy to learn more.
Yes. Trustate requires Multi-Factor Authentication (MFA) for all user accounts (including for your underlying clients) to enhance security further. This protocol helps prevent unauthorized access by requiring multiple forms of verification.
Our software is built on the best in class platforms with the highest security standards in place. In addition to our secure platform, we have implemented a 3-step verification process to ensure the security of the data.
To safeguard against unauthorized access, we do not allow user account sharing under any circumstances.
Only with your permission and direction. If you would like all estate administration communication to go through you, that is perfectly fine. If you prefer we reach out to the client directly, that works too. The choice is yours!