Operations live · 99.2% uptime
+1 469 940 7469
i Security & Compliance

Compliance is a discipline, not a checkbox.

We invest continuously in the controls our clients are audited against, independently verified, contractually guaranteed, and available for review on request.

ii Independently audited

Certifications and attestations.

SOC 2Type II

Independently audited security, availability, and confidentiality controls, covering people, processes, and platform.

HIPAACompliant

PHI handling with BAAs, encryption in transit and at rest, role-based access, and audit trails sufficient for healthcare programs.

PCI DSSReady

Tokenization, scoped network segmentation, and approved payment handling for card-present and card-not-present flows.

GDPRAligned

Lawful basis, data subject rights, data minimization, and EU-compatible processing agreements available on request.

iii Defense in depth

Four pillars, enforced together.

People

Background-checked staff, role-based access, mandatory annual security training, and clean-desk / restricted-device policies on the operations floor.

Process

Documented incident response, change management, vulnerability management, and continuous monitoring against the controls our clients are audited against.

Platform

Encryption in transit and at rest, key rotation, MFA across all admin surfaces, and audit logs preserved for the term of every engagement.

Premises

CCTV, electronic badge access, restricted device policies, and physical separation of client-secure areas in our Belmopan operations facility.

iv Reporting a vulnerability

We answer security email first.

If you believe you have found a vulnerability in our website, platform, or operations, write to our security team. We acknowledge within one business day, prioritize over other inbound, and confirm remediation when shipped.

Audit reportsOn request, under NDA
Pen testsAnnual, by independent firm
EncryptionTLS 1.2+ / AES-256 at rest
BackupsGeographically redundant
MFAEnforced on all admin surfaces
· Procurement-ready

Pass us through your vendor risk review.

Cookies

This website uses cookies and tracking technologies to enhance experience and analyze traffic. We share information with our analytics, advertising, and social partners. Detected opt-out signals are honored. See our privacy policy.