SOC 2 examination for Insider

Insider has successfully completed the SOC 2 Type 2 examination.

Building data security is a continuous process that shapes the foundation of our development processes and helps to ensure the outstanding performance of our industry-leading technologies. More than 1,200 leading enterprise brands trust Insider with their data. As a GDPR-compliant and ISO/IEC 27001 ISMS-certified company, data privacy and security lie at the core of our technology and our culture:

We proudly announce that Insider has completed the SOC 2 Type 2 examination, a rigorous assessment of our data security practices and controls.

The scope of Insider’s SOC 2 Type 2 Report includes:

Scope: Insider Growth Management Platform

Selected SOC 2 Criteria: Security, Availability, and Confidentiality

Review Date: March 2022, through March 2023 

What is SOC 2?

SOC 2 (System and Organization Controls 2) is an auditing framework developed by the American Institute of CPAs (AICPA) to ensure service providers securely manage and protect customer data. It focuses on five key trust principles:

  1. Security: The systems and data are protected against unauthorized access, both physical and logical.
  2. Availability: The systems and services are available for operation and use as agreed upon with the clients.
  3. Processing integrity: System processing is complete, accurate, timely, and authorized.
  4. Confidentiality: Information designated as confidential is protected as agreed upon with the clients.
  5. Privacy: Personal information is collected, used, retained, and disclosed in compliance with applicable privacy regulations.

What is SOC 2 Type 2?

SOC 2 Type 2 is a comprehensive assessment that evaluates the effectiveness of a service organization’s controls over an extended period. It verifies the design of controls and examines their operational effectiveness over a specified period. By achieving SOC 2 Type 2 compliance, we have proven our ability to consistently implement and maintain robust security, availability, and confidentiality practices.

Our Commitment to Data Security

At Insider, we understand that data security is of paramount importance to our clients. We have invested significant time and resources to ensure that our systems, processes, and people adhere to the highest industry standards. Our commitment to data security includes:

  1. Robust Infrastructure: We have implemented state-of-the-art infrastructure with multi-layered security controls, firewalls, intrusion detection systems, and encrypted communications to safeguard against external threats.
  2. Access Controls: We enforce strict access controls and employ industry-leading authentication and authorization mechanisms to ensure that only authorized personnel have access to sensitive data.
  3. Data Encryption: We utilize strong encryption algorithms to protect data in transit and at rest, ensuring it remains secure and confidential.
  4. Ongoing Monitoring: We continuously monitor our systems and networks, employing advanced security tools and conducting regular vulnerability assessments and penetration tests to identify and mitigate potential risks.
  5. Employee Training: We provide comprehensive training programs to educate our employees about data security best practices, privacy policies, and their responsibilities in protecting sensitive information.

By completing the SOC 2 Type 2 examination, Insider has demonstrated its adherence to the highest industry standards for data security and privacy. We are committed to maintaining and enhancing our security practices to ensure the continued protection of our clients’ data.

Privacy Policy

Previous Policy

Insider Security

Next Policy