top of page
21972-312_SOC_NonCPA.png

Visit.org is SOC 2 compliant!

We take security as seriously as we do employee engagement

Rather than simply check the box on compliance measures, we diligently maintain a risk-based security and privacy program to protect our Corporate Partner data.

Protecting your
personal privacy data

We're committed to protecting personal privacy information by adhering to the General Data Protection Regulation (GDPR). Established in the E.U. in 2018, GDPR is a law that guides how companies should handle people’s data.

data privacy icon

Transparent privacy policy

Personal data is processed lawfully, fairly, and transparently as outlined in the Visit.org Privacy Policy.

Prioritized consent

Every user must provide consent during registration before Visit.org processes any personal data.

Data deletion process

Any user at any time can access their personal data, and request its erasure via privacy@visit.org.

Dedicated incident response

In the unlikely event of a data breach, Visit.org’s step-by-step response plan will kick into action to ensure timely notification to Corporate Partners and a thorough response to contain the incident and minimize potential impacts.

Customer data processing agreement

This agreement defines Visit.org’s rights and obligations when it processes personal data on behalf of its Corporate Partners. It includes:

  • Explanation of the rights of data subjects

  • List of existing sub-processors and procedures for notifying Corporate Partners of new sub-processors

  • Description of industry-standard technical and organizational security measures for protecting personal data processed

Security and privacy initiatives

Sophisticated
endpoint protection

Sophisticated
endpoint protection

to guard against advanced threats on all devices​

Strong access controls

Strong access controls

with required 2FA and SSO when accessing sensitive systems

Commitment to
user privacy

Commitment to
user privacy

to regularly train our employees on the latest threats and protections

Least privileged access

Least privileged access

to tightly manage permissions based on role

Independent
penetration testing

Independent
penetration testing

to validate the security of our platform

Secure from the start

Secure from the start

to automatically identify vulnerabilities for fixing

Comprehensive
data protection

Comprehensive
data protection

with strong data encryption protocols

Continuous
control monitoring

Continuous
control monitoring

to gauge the effectiveness of over 100 security measures daily

bottom of page