SOC 2: Pathpoint Maintains Effective Security Controls

SOC 2: Pathpoint Maintains Effective Security Controls

SOC 2: Pathpoint Maintains Effective Security Controls
By 
Shayla Price
Feb 23, 2022
LinkedIn Icon

Pathpoint has undergone a System and Organization Controls (SOC) 2 examination resulting in a CPA’s report stating that our management maintained effective controls over security and confidentiality. The engagement was performed by BARR Advisory, P.A. 


BARR Advisory is a cloud-based security and compliance solutions provider, specializing in cybersecurity consulting and compliance for SaaS companies. BARR simplifies compliance across multiple regulatory and customer requirements in highly regulated industries including technology, financial services, healthcare, and government.


A SOC 2 report is designed to meet the needs of existing or potential customers who need assurance about the effectiveness of controls used by the service organization to process customers’ information.


 "We are pleased that our SOC 2 report has shown we have the appropriate controls in place to mitigate risks related to security and confidentiality,” said James McKernan, principal engineer at Pathpoint. 


“This annual evaluation is a critical piece of the puzzle to build a culture of continuous accountability, so our customers can have full confidence their data & business is safe with us.”


The following principles and related criteria have been developed by the American Institute of CPAs (AICPA) for use by practitioners in the performance of trust services engagements: 


  • Security: The system is protected against unauthorized access (both physical and logical). 
  • Availability: The system is available for operation and use as committed or agreed.
  • Processing Integrity: System processing is complete, valid, accurate, timely, and authorized to meet the entity’s objectives. 
  • Confidentiality: Information designated as confidential is protected as committed or agreed.
  • Privacy: Personal information is collected, used, retained, disclosed, and disposed of to meet the entity’s objectives. 
  • HIPAA Security Rule Requirements: The system is compliant with the applicable HIPAA Security Rule requirements set forth in the U.S. Department of Health and Human Services’ (HHS) Health Information Portability and Accountability Act. 


Current and prospective customers interested in learning more about Pathpoint’s SOC 2 compliance may contact us at support@pathpoint.com.

More From Our Blog

Explore all posts