Compliance @juli
juli is fully SOC2 Type 1 certified
We are excited to announce that juli has been certified for SOC2 Type I compliance. This certification marks a milestone in our ongoing efforts to handle and manage data in a secure and responsible way. This rigorous, independent assessment of our internal security controls serves as validation of our dedication and adherence to the highest standards for security and confidentiality.
As a user-centric digital health company it is our duty to protect our users data at all cost and ensure their privacy. To accomplish this we have build our platform and applications according to rigorous standards and procedures. Our SOC2 certification helps us proof how committed we are to privacy and security.„we are very happy to have reached certification as it underlines our core principles to keep our users data save. With this industry-leading certification we are now able to proof that commitment”.
What is a SOC 2 audit?
To have real-time visibility across our organization to ensure the end-to-end security and compliance posture of our systems, we have deployed automated monitoring of our system and infrastructure.What is a SOC 2 audit? SOC is the abreviation for “Service and Organization Controls”. These controls form a set of standards outlined by the American Institute of Certified Public Accountants (AICPA) to make it measurable how a service organization handles their users’ data. In short, the AICPA, developed the SOC 2 framework as an extensive auditing procedure to ensure a company is handling data securely and in a way which protects the privacy of its customers as well as the organization itself. SOC 2 is designed for companies storing customer data in the cloud. SOC2 compliance is granted by a certified 3rd party auditing organisation. Companies often rely on a service organization’s SOC 2 report as a security compliance requirement.
For juli, the report serves as proof to our customers that we sufficiently:
Securing of customer data and personal information
Prevent unauthorized access to customer data and information
Secure handling and transmission of data
Secure data retention and disposal
What is included in juli’s SOC 2 report?
Our full SOC 2 report describes the various security controls and processes we use to secure customer data. It details our software infrastructure as well as the processes we use to achieve data security and availability. A few of the controls covered in our report are:
System monitoring and ongoing risk assessments
Internal access control to production environments
Disaster recovery, data backup, and incident response processes
Threat and Security incident management and response
Data handling, retention and disposal
For juli, the commitment doesn’t end here
As part of our ongoing dedication to data security and availability, we are consistently and critically reviewing how we collect, manage, and secure customer data. And as part of that process we continue by obtaining periodic SOC 2 Type II reports which will actively audit our handling of the controls defined in our SOC2 Type I report. If you are an active or prospect business partner and you would like to obtain a copy of our SOC2 report, please reach out to info@juli.co.