Docs
Sign up now
  • Getting started
    • Welcome to Sortment
    • Core Concepts
  • Schema
    • Overview
    • Related and Events Table
    • Setting Up Related Table
    • Setting Up Events Table
    • Custom Properties
  • ENGAGE
    • Audiences
      • Creating Audience Using Visual Builder
      • Audience Filters
      • Campaign Event Filters
      • Creating Audience Using SQL Builder
      • Managing Audiences
      • Sync Schedule
      • Audience Insights
    • Campaigns
      • Overview
      • Building a Campaign
      • Campaign Reports
        • Glossary
      • Conversion Tracking
  • Profiles
    • User Profile View
  • Traits
    • Use Cases
    • Calculated Traits
      • Advanced Mode
    • Dynamic Traits
  • Setup
    • Data Warehouses
      • Snowflake
      • BigQuery
      • Redshift
      • Databricks
      • PostgreSQL
    • Cloud Bucket Storage
      • Amazon S3 for Snowflake
      • Google Cloud Storage for BigQuery
      • Amazon S3 for Redshift
      • Amazon S3 for Databricks
    • Communication Channels
      • Email
        • SendGrid
        • SES
        • Mailmodo
      • SMS
        • MSG91
        • Gupshup
      • WhatsApp
        • Meta (Facebook)
          • Add new Phone Number to Meta
        • Gupshup Enterprise
        • WATI
        • Gallabox
        • Yellow.ai
        • Kaleyra.io
    • Real-time Events
      • Setting up Event Source
      • Whitelist Event Payload
  • Sync Schedules
  • Audit Logs
  • Subscription Groups And Contact Fields
  • Delivery Controls
  • Alerts
  • Handlebars
  • Test Profiles
  • Data and Security
    • Technical Overview
    • Warehouse Data Practices
    • Data Access And Usage
    • Security Compliance
    • Audit Logs
    • Privacy Policy
Powered by GitBook
On this page

Was this helpful?

  1. Data and Security

Security Compliance

PreviousData Access And UsageNextAudit Logs

Last updated 7 months ago

Was this helpful?

Sortment is committed to protecting your data. It is built with industry-leading standards in mind.

1. SOC2 Compliance

Sortment complies with SOC2 Type II standards, ensuring that data security, availability, processing integrity, confidentiality, and privacy are maintained:

  • Security: All data is encrypted and access-controlled, preventing unauthorized use.

  • Availability: The system is designed for high availability, with backup and disaster recovery measures in place.

  • Confidentiality: Sensitive data, including user and business information, is managed confidentially throughout the data lifecycle.

  • Processing Integrity: Data processing is accurate and reliable, with custom filters and segmentation tools ensuring accurate audience creation.

  • Privacy: Sortment complies with privacy regulations and provides users control over their personal data.

Sortment undergoes regular SOC2 audits by independent third parties to ensure compliance.

2. ISO 27001 and ISO 27701 Compliance

Sortment follows the ISO 27001 and ISO 27701 information security management standard, focusing on:

  • Information Security Management System (ISMS): A formal ISMS ensures that Sortment continuously assesses and mitigates risks associated with data security.

  • Risk Management: Regular risk assessments are conducted to identify potential security threats and mitigate them promptly.

  • Employee Training: All employees undergo mandatory training to stay updated on the latest security best practices and threats.

By adhering to the standards, Sortment ensures that data security is embedded across all processes and operations.

For an architecture overview or accessing compliance and audit reports, reach out to ankit@sortment.com