Rate Notice: 5.9% general rate increase Jan 1, 2026 — Learn More
    UNIS logo

    The company is now SOC 2 Certified

    Industry Newssoc2compliancesecurity
    Emily Johnson

    Emily Johnson

    5 min read
    0Loading...
    The company is now SOC 2 Certified

    We are thrilled to announce a significant milestone in our ongoing commitment to security and data protection: We have successfully achieved SOC 2 Type II compliance. This rigorous, independent audit affirms that our information security practices, policies, procedures, and operations meet the stringent SOC 2 standards for security, availability, and confidentiality.

    For our customers, this certification provides an additional layer of assurance that their data is being handled with the highest level of care and protection. It demonstrates our dedication to being a trusted partner and our proactive approach to security in an ever-evolving digital landscape.

    What This Means for You

    • Enhanced Security: Our systems and controls are designed to protect your data against unauthorized access. We have implemented robust security measures, including encryption, access controls, and network monitoring, to safeguard your information.
    • Guaranteed Availability: The SOC 2 framework ensures that our services are reliably accessible to you when you need them. We have resilient infrastructure and disaster recovery plans in place to minimize downtime and ensure business continuity.
    • Strict Confidentiality: We are committed to protecting the confidentiality of your information. Our SOC 2 compliance confirms that we have the necessary controls in place to prevent the unauthorized disclosure of your sensitive data.

    The journey to SOC 2 compliance was a comprehensive and collaborative effort across our entire organization. The audit was conducted by an independent, third-party firm that performed a thorough review of our systems, controls, and processes over a period of several months.

    Understanding the Five Trust Service Principles

    SOC 2 is built around five Trust Service Principles, which are the cornerstones of a secure and reliable service. While our audit focused on Security, Availability, and Confidentiality, its important to understand all five:

    1. Security: The system is protected against unauthorized access, use, or modification.
    2. Availability: The system is available for operation and use as committed or agreed.
    3. Processing Integrity: System processing is complete, valid, accurate, timely, and authorized to meet the entity’s objectives.
    4. Confidentiality: Information designated as confidential is protected as committed or agreed.
    5. Privacy: Personal information is collected, used, retained, disclosed, and disposed of in conformity with the commitments in the entity’s privacy notice.

    Achieving SOC 2 Type II compliance is not a one-time event; it is an ongoing commitment. We will continue to invest in our security program and undergo regular audits to ensure that we maintain the highest standards of data protection for our customers. We are proud of this achievement and look forward to continuing to earn your trust.

    Loading comments...