Brightback Security Overview
When it comes to corporate and data security, we're committed to meeting the needs of today's web regulatory environment. We aim to deliver the best overall experience from our AWS-hosted platform, and invest in annual SOC2 auditing and continuous monitoring to ensure compliance.
SOC 2 Audits
A SOC 2 Audit is done in accordance with the American Institute of Certified Public Accountants (AICPA) Trust Services Criteria for Security, Availability, Processing Integrity, Confidentiality, and Privacy (AICPA, TSP Section 100).
What security protocol does Brightback invest in?
- Privacy & security training
All Brightback employees are trained and certified on data privacy policies and best practices.
- End-to-end encryption
All data in Brightback is stored and transmitted with end-to-end encryption. We also store your data using 256-bit AES encryption, which makes your data highly secured.
- Vendor audit & approval process
Brightback performs a comprehensive compliance review and approval process before using and licensing third-party tools.
- Data encryption & access controls
In transit and at rest, all customer data is encrypted using only industry-leading tools, standards and best practices for data handling and security.
- Information security policy
Brightback’s Information Security Policy and Procedures are thoughtfully created using the ISO 2700x standard.
- Security & compliance
Brightback maintains compliance with an annual examination and attestation to SOC 2.
How long does Brightback store customer data?
By default, a customer's data is stored for the duration of his or her contract with Brightback.