Skip to main content
Log inGet a demo
Get a demo

Announcing Hightouch's SOC 2 compliance

Hightouch has achieved SOC 2 Type 1 compliance for the security, availability, and confidentiality trust service principles.

Joshua Curl.

Joshua Curl

June 3, 2021

2 minutes

Announcing Hightouch's SOC 2 Compliance.

The story of Hightouch: giving you control of your data

The story of how Hightouch began is fundamentally a story about security. From the beginning Hightouch has been architected to work on top of the data you already own, in your warehouse, rather than being a data store ourselves. It's even possible to store the entirety of our caches and temporary stores within your own cloud environment. This novel architecture is inherently more secure and simplifies much of the work around compliance.

The latest step in our security journey: SOC 2 Compliance

While the architecture of Hightouch sets up a solid foundation for security, it doesn't negate the need for other security best practices and proper internal controls. As such, our team has made these a priority and we're happy to announce that we've reached SOC 2 Type 1 certification.

SOC 2 compliance is an additional sign that Hightouch sets the security of your data as a top priority. With peace of mind that data is flowing securely between your warehouse and your SaaS tools with Hightouch, you can focus more time on your customers.

What does SOC 2 compliance mean?

SOC 2 compliance means that a trusted external auditor deeply reviewed Hightouch's internal operations, based on standards set by the AICPA, and deemed that Hightouch follows top security practices. Hightouch received certification for the following three principles.

  • Security: our protection of customer information during its collection, creation, use, processing, transmission, and/or storage
  • Confidentiality: our ability to protect information that’s designated as confidential from its initial collection through its disposal.
  • Availability: whether our customers can access our products. This includes system uptime, monitoring, and maintenance.

How can I find more details about the Hightouch SOC 2 Report?

If you are an existing Hightouch Business Tier customer, you can reach out to us directly to obtain a copy of our full SOC 2 report. If you are not yet a Business Tier customer but are considering buying Business Tier, we can provide you a copy of our full SOC 2 report under NDA.

More on the blog

  • What is Reverse ETL? The definitive guide .

    What is Reverse ETL? The definitive guide

    Learn how Reverse ETL works, why it's different from traditional ETL, and how you can use it to activate your data.

  • Friends don’t let friends buy a CDP.

    Friends don’t let friends buy a CDP

    How spending the first half of his professional career at Segment drove Tejas Manohar to disrupt the 3.5 billion dollar CDP category.

  • What is a Composable CDP?.

    What is a Composable CDP?

    Learn why Composable CDPs are seeing such rapid adoption, how they work, and why they're replacing traditional CDPs.

Share

Sign up for our newsletter

It takes less than 5 minutes to activate your data. Get started today.