Announcing Our SOC 2 Certification

Overview of Qualytics SOC 2 Type II compliance achievement, detailing security controls, audit processes, data protection measures, and commitment to customer trust.

Eric Simmerman

CTO & Co-Founder

Apr 25, 2024

5

min read

Table of Contents

We Are SOC 2 Type 2 Compliant

We are delighted to announce that Qualytics has been certified as SOC 2 Type II compliant, having successfully completed our audit between November - January 2024. After a comprehensive surveillance of systems and procedures conducted by independent auditors, the company’s controls were officially acknowledged as compliant with the five provisions prepared by the American Institute of CPAs (AICPA): security, availability, confidentiality, processing integrity, and privacy.

SOC 2 Type 2 confirms that Qualytics has fulfilled the rigorous requirements that were audited during the certification process examining systems and policies including:

Infrastructure and Software – penetration tests, access control, system monitoring, firewall and automated security checks, secure coding & deployment People – background checks, employee onboarding, confidentiality, security awareness trainings Policies and Procedures – disaster recovery, data backup, incident response processes Data – source code protection, communication encryption, DPA, internal access control to production environments

Our report is available for review from our Trust Center and we’re happy to share it.

No items found.

Related Articles

Related News

Discover More From Qualytics.

Join the companies using Qualytics to make data quality proactive, automated, and shared across business and date teams.

Announcing Our SOC 2 Certification

Overview of Qualytics SOC 2 Type II compliance achievement, detailing security controls, audit processes, data protection measures, and commitment to customer trust.

Eric Simmerman

CTO & Co-Founder

Apr 25, 2024

5

min read

About the Customer

We Are SOC 2 Type 2 Compliant

We are delighted to announce that Qualytics has been certified as SOC 2 Type II compliant, having successfully completed our audit between November - January 2024. After a comprehensive surveillance of systems and procedures conducted by independent auditors, the company’s controls were officially acknowledged as compliant with the five provisions prepared by the American Institute of CPAs (AICPA): security, availability, confidentiality, processing integrity, and privacy.

SOC 2 Type 2 confirms that Qualytics has fulfilled the rigorous requirements that were audited during the certification process examining systems and policies including:

Infrastructure and Software – penetration tests, access control, system monitoring, firewall and automated security checks, secure coding & deployment People – background checks, employee onboarding, confidentiality, security awareness trainings Policies and Procedures – disaster recovery, data backup, incident response processes Data – source code protection, communication encryption, DPA, internal access control to production environments

Our report is available for review from our Trust Center and we’re happy to share it.

More case studies you might like

Discover More From Qualytics.

Announcing Our SOC 2 Certification

Overview of Qualytics SOC 2 Type II compliance achievement, detailing security controls, audit processes, data protection measures, and commitment to customer trust.

We Are SOC 2 Type 2 Compliant

We are delighted to announce that Qualytics has been certified as SOC 2 Type II compliant, having successfully completed our audit between November - January 2024. After a comprehensive surveillance of systems and procedures conducted by independent auditors, the company’s controls were officially acknowledged as compliant with the five provisions prepared by the American Institute of CPAs (AICPA): security, availability, confidentiality, processing integrity, and privacy.

SOC 2 Type 2 confirms that Qualytics has fulfilled the rigorous requirements that were audited during the certification process examining systems and policies including:

Infrastructure and Software – penetration tests, access control, system monitoring, firewall and automated security checks, secure coding & deployment People – background checks, employee onboarding, confidentiality, security awareness trainings Policies and Procedures – disaster recovery, data backup, incident response processes Data – source code protection, communication encryption, DPA, internal access control to production environments

Our report is available for review from our Trust Center and we’re happy to share it.

More videos you might like

Discover More From Qualytics.