SOC 2 Certified
Innovative Network Solutions is a SOC 2 Type 1-certified service provider. Learn more about our dedication to your security and how this certification helps ensure you’re in good hands.
LET'S TALK: (866) 572-2850 How Can We Help?Innovative Network Solutions is a SOC 2 Type 1-certified service provider. Learn more about our dedication to your security and how this certification helps ensure you’re in good hands.
LET'S TALK: (866) 572-2850 How Can We Help?SOC (System and Organization Controls) 2 is a certification completed by a third-party assessor that testifies a service provider is following secure data management standards.
INSC has successfully completed the SOC 2 Type 1 certification, which attests that our security policies and practices for handling your data are completely up to date and effective.
Get your consultationBoth physical and electronic data is securely stored and protected from unauthorized users. Monitoring for suspicious activity and an action plan for the event of a data breach are in place.
Information designated as confidential, such as Private Health Information (PHI) or Personally Identifiable Information (PII), is fully protected from unauthorized users both within and outside the service organization.
Privacy controls for information follow the AICPA’s Generally Accepted Privacy Principles (GAPP). Personal data is collected, used, and disposed of securely.
Transactions are securely completed and recorded. Financial transactions are encrypted, and platform access or transaction history is granted to authorized users as marketed.
Specific systems and accesses are available to customers and clients as contractually required.
INSC’s SOC 2 report verifies the existence of internal controls which have been designed and implemented to meet all requirements for security principles set forth in the Trust Services Principles and Criteria for Security. It provides a thorough review of how INSC’s internal controls affect the security, availability, and processing integrity of the systems it uses to process users’ data, and the confidentiality and privacy of the information processed by these systems. This independent validation of security controls is crucial for customers in highly regulated industries.
A copy of the SOC 2 audit report or attestation is available to clients and prospective clients on demand.