Trust

Security

How we safeguard your data

PowerAdvocate has a robust and comprehensive Information Security Program for its products and related services, which includes the following elements:

  • Confidentiality Requirements
  • Information Management
  • Software Development
  • Incident Management
  • Business Continuity & Disaster Recovery
  • Risk Management
  • Physical Security & Infrastructure
  • Network Security
  • Access Control, Roles & Permissions
  • Third Parties & Subcontractors
  • Asset Management
  • Vendor Risk Review
  • Change Management
  • Information Backup & Recovery

These controls are audited for compliance with AICPA SOC2 Type II annually.  The last audit was completed successfully on November 9, 2018 by Skoda Minotti & Co.

For more information contact Security@PowerAdvocate.com

Privacy

Our commitment to privacy

PowerAdvocate Privacy Statement

Our Privacy Statement summarizes our Personal Data processing practices and your related rights. 

When you use and interact with our websites or services, communicate with or otherwise contact us or visit our offices or attend our events, we may collect, use, share and process information relating to you ("Personal Data").

Privacy Shield Privacy Policy

PowerAdvocate participates in the EU-U.S. Privacy Shield (“Privacy Shield”) framework issued by the U.S. Department of Commerce.

California Consumer Privacy Act of 2018 Privacy Notice

This Privacy Notice is for California residents and supplements the information contained in the PowerAdvocate Online Privacy Notice. It applies solely to visitors, users, and others who reside in California (consumers or you).