Data Security and Compliance
We've Got You Covered
iCapture ensures that the data delivered to your tech stack remains clean and consistent. Our template architecture takes into account the field types and required fields to ensure a successful delivery with every lead captured.
Our level of security includes GDPR, CCPA, and SOC 2 compliance, which ensures the data you are collecting is safeguarded.
Application Security
Encryption
Data is encrypted in transit with TLS 1.2. Data is encrypted at rest with AES.
Continuous Monitoring
Independent third-party penetration, threat, and vulnerability testing.
Data Handling
iCapture is in full compliance with GDPR and has support for data deletion.
SSO
User access controls with single sign on.
Secure Hosting
iCapture’s cloud environments are backed by Google's security measures.
RBAC
Role based account access workflows.
Continuous Security Commitment
Penetration Testing
We perform an independent third-party penetration test at least annually to ensure ongoing protection.
Security Training
Our team goes through employee security awareness training covering industry standard practices.
Third-Party Audits
Our organization undergoes independent third-party assessments to test our security controls.
Roles and Responsibilities
Roles and responsibilities related to our information security program are well defined and documented.
Information Security Program
Our information security program follows the criteria set forth by ISO 27001 and SOC 2.
Continuous Security Monitoring
We continuously monitor our security and compliance status to ensure there are no lapses.
Interested in knowing more?
Learn about how iCapture can help you maximize your leads with a 1:1 demo with one of our specialists.