Trust Center

PRIVACY AND SECURITY ARE IMPORTANT TO US.
SO IS TRANSPARENCY.

Our Trust Center is your guide to how we collect, use, and protect data. If you have any questions that aren’t answered here, please reach out.

 
 

Manage Your Personal Data

Here's how you can actively manage and control your data.

 

Audits and Governance

We are committed to maintaining high standards of data security and privacy for our customers. To achieve this, we have adopted the Standard Controls Framework (SCF)'s integrated controls model. This framework provides a comprehensive set of controls that cover all aspects of our operations, including data security, privacy, governance, risk management, and compliance.

ISO 27001

ISO 27001 is a globally recognized standard for the establishment and certification of an information security management system (ISMS). Our entire information security program is built on the ISO 27001 framework and we are audited annually.

✓ ISO 27001 certificate
✓ ISO 27001 report

SOC 2 Type 2

Components of the Suzy platform are SOC 2 Type 2 compliant. Suzy undergoes a SOC 2 Type 2 examination of our security controls against the AICPA defined standards on an annual basis with a third party audit firm to ensure the security of our platform.

✓ SOC 2, Type II report

ISO 27701

ISO 27701 is a globally recognized standard for the establishment and certification of a privacy information management system (PIMS) that builds on ISO 27001. Our entire privacy program is being built on the ISO 27701 framework.

Coming soon!

Security

We’re built with a secure foundation and designed with robust compliance features.

Suzy Security Statement
Access control (authentication and authorization)
Data encryption at rest and in transit
Transport Layer Security (TLS) encryption (also known as HTTPS) for all transmitted data
Services hosted by trusted data centers that are independently audited using the industry standard SSAE-18 method
Continuous network and security monitoring
Vulnerability management
Incident response and recovery
Security awareness training
Periodic independent 3rd-party security reviews and penetration testing

Status

Suzy's status page for real-time and historical data on system performance.