It’s live! Access exclusive 2024 live chat benchmark data & see how well your team is performing.

Get the data

Comm100 Live Chat is SOC 2 Type II compliant so you can rest easy knowing that your customers’ data is well-protected according to the strictest industry standards. SOC 2 Type II denotes the highest degree of excellence in security, availability, processing integrity, confidentiality, and privacy of customer data – and Comm100 is proud to be leading the way, including SOC 2 Type II compliant live chat.

Here is how Comm100 complies with each of the five key trust service principles on which SOC 2 Type II is based, to ensure live chat security for both you and your customers.

soc 2 type ii compliant

Security

To ensure your live chat security, Comm100’s servers and system resources are protected at the highest level with firewalls, two-factor authentication, and intrusion prevention. To further protect against unauthorized access, Comm100 partners with advanced tier-1 data centers, which are SOC 2 Type II compliant as well.

comm100 high availability

Availability

The Comm100 platform promises maximum uptime and availability – after all, communicating with your customers is mission critical. An always-on monitoring system automatically notifies our IT experts if it detects a problem, providing a thorough diagnosis for fast, efficient, and transparent incident management. For more on Comm100’s high availability promise, see below.

secure data center comm100

Processing Integrity

Achieving SOC 2 Type II compliance for live chat and omnichannel communication involves a thorough recurring audit process. This ensures our policies, processes and technology remain effective and up to the latest standards over time. Our process monitoring and quality assurance are trusted by even the most heavily regulated industries.

live chat security

Privacy

Comm100 manages data collection, retention, use, disclosure, and disposal in accordance with the American Institute of Certified Public Accountants’ (AICPA) privacy principles. Network and application firewalls keep data, especially sensitive information, protected to the highest standard.

live chat security

Confidentiality

As required by SOC 2 Type II, procedures are in place to identify confidential information, determine its length of retainment, and protect it from erasure until its retention is period is reached. Data access and disclosure restrictions further protect our customers’ – and our customers’ customers’ — confidentiality.

To obtain a copy of Comm100's SOC 2 Type II certification report, contact us today.

Request the report

Get started today

Join thousands of happy Comm100 customers