Comm100 Live Chat is SOC 2 Type II compliant so you can rest easy knowing that your customers’ data is well-protected according to the strictest industry standards. SOC 2 Type II denotes the highest degree of excellence in security, availability, processing integrity, confidentiality, and privacy of customer data – and Comm100 is proud to be leading the way, including SOC 2 Type II compliant live chat.
Here is how Comm100 complies with each of the five key trust service principles on which SOC 2 Type II is based, to ensure live chat security for both you and your customers.
To ensure your live chat security, Comm100’s servers and system resources are protected at the highest level with firewalls, two-factor authentication, and intrusion prevention. To further protect against unauthorized access, Comm100 partners with advanced tier-1 data centers, which are SOC 2 Type II compliant as well.
The Comm100 platform promises maximum uptime and availability – after all, communicating with your customers is mission critical. An always-on monitoring system automatically notifies our IT experts if it detects a problem, providing a thorough diagnosis for fast, efficient, and transparent incident management. For more on Comm100’s high availability promise, see below.
Achieving SOC 2 Type II compliance for live chat and omnichannel communication involves a thorough recurring audit process. This ensures our policies, processes and technology remain effective and up to the latest standards over time. Our process monitoring and quality assurance are trusted by even the most heavily regulated industries.
Comm100 manages data collection, retention, use, disclosure, and disposal in accordance with the American Institute of Certified Public Accountants’ (AICPA) privacy principles. Network and application firewalls keep data, especially sensitive information, protected to the highest standard.
As required by SOC 2 Type II, procedures are in place to identify confidential information, determine its length of retainment, and protect it from erasure until its retention is period is reached. Data access and disclosure restrictions further protect our customers’ – and our customers’ customers’ — confidentiality.