Autoagent Data Solutions, LLC | Trust Center
Trust Center
Our Trust Center serves as a central hub for demonstrating our commitment to security, privacy, compliance, and transparency. It provides resources, certifications, policies, and tools to help our customers and stakeholders understand how we protect their data, ensure compliance with industry standards, and maintain trust in our products and services.
View Compliance

Compliance

PCI

We are PCI DSS Level 1 compliant, ensuring the highest standards for securing payment card data.

Accessibility Statement

We aim to adhere as strictly as possible to W3C's WCAG 2.1 standards at the AA level.

SOC 2 Type 2

Coming Soon!

HIPAA

Coming Soon!

Monitoring

Continuously monitored by Secureframe

Monitoring

Change Management

Secure Development Policy
A Secure Development Policy defines the requirements for secure software and system development and maintenance.
Segregation of Environments
Development, staging, and production environments are segregated.
Change Management Policy
A Change Management Policy governs the documenting, tracking, testing, and approving of system, network, security, and infrastructure changes.
Configuration and Asset Management Policy
A Configuration and Asset Management Policy governs configurations for new sensitive systems

Organizational Management

Information Security Program Review
Management is responsible for the design, implementation, and management of the organization’s security policies and procedures. The policies and procedures are reviewed by management at least annually.
Security Awareness Training
Internal personnel complete annual training programs for information security to help them understand their obligations and responsibilities related to security.
Background Checks
Background checks or their equivalent are performed before or promptly after a new hires start date, as permitted by local laws.
Information Security Policy
An Information Security Policy establishes the security requirements for maintaining the security, confidentiality, integrity, and availability of applications, systems, infrastructure, and data.
Personnel Acknowledge Security Policies
Internal personnel review and accept applicable information security policies at least annually.

Vulnerability Management

Vulnerability and Patch Management Policy
A Vulnerability Management and Patch Management Policy outlines the processes to efficiently respond to identified vulnerabilities.

Incident Response

Incident Response Plan Testing
The Incident Response Plan is periodically tested via tabletop exercises or equivalents. When necessary, Management makes changes to the Incident Response Plan based on the test results.
Incident Response Plan
An Incident Response Plan outlines the process of identifying, prioritizing, communicating, assigning and tracking confirmed incidents through to resolution.
Lessons Learned
After any identified security incident has been resolved, management provides a "Lessons Learned" document to the team in order to continually improve security and operations.

Risk Assessment

Vendor Risk Assessment
New vendors are assessed in accordance with the Vendor Risk Management Policy prior to engaging with the vendor. Reassessment occurs at least annually.

Network Security

Endpoint Security
Company endpoints are managed and configured with a strong password policy, anti-virus, and hard drive encryption
Network Security Policy
A Network Security Policy identifies the requirements for protecting information and systems within and across networks.
Automated Alerting for Security Events
Alerting software is used to notify impacted teams of potential security events.

Access Security

Encryption and Key Management Policy
An Encryption and Key Management Policy supports the secure encryption and decryption of app secrets, and governs the use of cryptographic controls.
Encryption-in-Transit
Service data transmitted over the internet is encrypted-in-transit.
Asset Inventory
A list of system assets, components, and respective owners are maintained and reviewed at least annually
Removal of Access
Upon termination or when internal personnel no longer require access, system access is removed, as applicable.
Access Control and Termination Policy
An Access Control and Termination Policy governs authentication and access to applicable systems, data, and networks.
Unique Access IDs
Personnel are assigned unique IDs to access sensitive systems, networks, and information
Access to Product is Restricted
Non-console access to production infrastructure is restricted to users with a unique SSH key or access key