We invest continuously in the controls our clients are audited against, independently verified, contractually guaranteed, and available for review on request.
Independently audited security, availability, and confidentiality controls, covering people, processes, and platform.
PHI handling with BAAs, encryption in transit and at rest, role-based access, and audit trails sufficient for healthcare programs.
Tokenization, scoped network segmentation, and approved payment handling for card-present and card-not-present flows.
Lawful basis, data subject rights, data minimization, and EU-compatible processing agreements available on request.
Background-checked staff, role-based access, mandatory annual security training, and clean-desk / restricted-device policies on the operations floor.
Documented incident response, change management, vulnerability management, and continuous monitoring against the controls our clients are audited against.
Encryption in transit and at rest, key rotation, MFA across all admin surfaces, and audit logs preserved for the term of every engagement.
CCTV, electronic badge access, restricted device policies, and physical separation of client-secure areas in our Belmopan operations facility.
If you believe you have found a vulnerability in our website, platform, or operations, write to our security team. We acknowledge within one business day, prioritize over other inbound, and confirm remediation when shipped.