Skip to content

Springshare Is SOC2 Type II Compliant

We're proud to announce that we’ve completed a System and Organization Controls (SOC) 2 Type II audit. This rigorous, independent assessment of our internal security controls serves as validation of our dedication and adherence to the highest standards for security, confidentiality, and privacy

controls-final.gif

This is an important milestone for our small company, but is in no way an end to our commitment to our customers and the security of their data. In fact, it's only the beginning! We are pursuing additional industry-standard certifications and audits to ensure that our customers have full confidence in Springshare's handling of customer data. We view security, privacy, and confidentiality as the foundations upon which our products are built and trust with our customers is earned and maintained.

Slaven Zivkovic, Springshare's Founder & CEO, remarked, "Successfully completing the SOC2 audit, without exceptions, validates what our team has always known to be true: that Springshare's SaaS tools and company workflows adhere to the highest standards when it comes to handling customer data, respect to data privacy and confidentiality, and our commitment to security."

Developed by the AICPA, SOC2 is an extensive auditing procedure that ensures a company is handling customer data securely and in a manner that protects the organization as well as the privacy of its customers. SOC2 is designed for service providers storing customer data in the cloud. Springshare’s information security practices, policies, procedures, and operations meet the rigorous SOC2 Trust Service Criteria.

If you need access to our SOC2 Type II report for in-house security protocols or discussions, please contact our support team.

2 thoughts on “Springshare Is SOC2 Type II Compliant”

  1. A huge congratulations to the Springshare team on this news and success! Thanks for sharing the news, too. We’ve recently begun looking into Cyber Security Insurance and any extra knowledge and awareness of vendor security audits, whether needed or not, is a welcomed thing!

Leave a Reply to Lilly Cancel reply

Your email address will not be published. Required fields are marked *

Confirm you aren't spamming: * Time limit is exhausted. Please reload the CAPTCHA.