Request Compliance Reports

SOC2 Assurance Report – This report covers the controls the business has in place to mitigate risk at length. It will also give an overview of operations and details the components of our system:

    • Infrastructure
    • People
    • Processes, Policies, and Procedures 
    • Data
    • Computer Operations
    • Risk Assessment
Web Application & API Pen Test Assurance Report –
We also subject our web application and API to regular independent
and professional penetration testing (‘pen-testing’).