Scope
Chargebee Retention Security Overview
How does SOC2 audit done for Retention?
What security protocol does Retention invest in?
Summary
When it comes to corporate and data security, we're committed to meeting the needs of today's web regulatory environment. We aim to deliver the best overall experience from our AWS-hosted platform and invest in annual SOC2 auditing and continuous monitoring to ensure compliance.
Solution
SOC 2 Audits
A SOC 2 Audit is done in accordance with the American Institute of Certified Public Accountants (AICPA) Trust Services Criteria for Security, Availability, Processing Integrity, Confidentiality, and Privacy (AICPA, TSP Section 100).
What security protocol does Retention invest in?
- Privacy & security training
All Retention employees are trained and certified on data privacy policies and best practices. - End-to-end encryption
All data in Retention is stored and transmitted with end-to-end encryption. We also store your data using 256-bit AES encryption, which makes your data highly secure. - Vendor audit & approval process
Retention performs a comprehensive compliance review and approval process before using and licensing third-party tools. - Data encryption & access controls
In transit and at rest, all customer data is encrypted using only industry-leading tools, standards and best practices for data handling and security. - Information security policy
Retention's Information Security Policy and Procedures are thoughtfully created using the ISO 2700x standard. - Security & Compliance
Retention maintains compliance with an annual examination and attestation to SOC 2.
How long does Retention store customer data?
By default, a customer's data is stored for the duration of his or her contract with Retention.