Trust

Security

How we safeguard your data

PowerAdvocate has a robust and comprehensive Information Security Program for its products and related services, which includes the following elements:

  • Confidentiality Requirements
  • Information Management
  • Software Development
  • Incident Management
  • Business Continuity & Disaster Recovery
  • Risk Management
  • Physical Security & Infrastructure
  • Network Security
  • Access Control, Roles & Permissions
  • Third Parties & Subcontractors
  • Asset Management
  • Vendor Risk Review
  • Change Management
  • Information Backup & Recovery

These controls are audited for compliance with AICPA SOC2 Type II annually.  The last audit was completed successfully on November 9, 2018 by Skoda Minotti & Co.

For more information contact Security@PowerAdvocate.com

Privacy

Our commitment to privacy

When you use and interact with our websites or services, communicate with or otherwise contact us or visit our offices or attend our events, we may collect, use, share and process information relating to you ("Personal Data").

Our Privacy Statement summarizes our Personal Data processing practices and your related rights.