SOC 2® Compliance

Information security is a serious concern for financial organizations. Mishandled data can leave enterprises vulnerable to attacks, including data theft, extortion and malware installation.

Today, the SOC 2® auditing procedure assures banks and lending organizations because it requires service providers to securely manage data. To protect interests and privacy, security-conscious businesses consider SOC 2 compliance as a critical component and requirement for all of their providers.

How is SOC2 Attained?

SOC 2 Report is issued by outside auditors, who assess the extent a service provider complies with one or more of the five trust principles, which are based on the systems and processes in place.

The American Institute of CPAs (AICPA), SOC 2’s five “trust service principles” include:

  • security
  • availability
  • integrity processing
  • confidentiality
  • privacy

Trinity is authorized in the security and the availability trust service principles, which are most relevant to the services Trinity offers to its clients.

Types of SOC 2 Reports

Type 1 - Reports on management’s description of a service organization’s system and the suitability of the design of controls.

Type 2 - Details the operational effectiveness of those systems.

Trinity and SOC 2

Today, Trinity currently holds SOC 2 Type 1 attestation and will proudly complete its SOC 2 Type 2 in July 2019.

After this time, Trinity will undergo regular yearly audits to ensure all requirements are met and Trinity remains SOC 2 compliant. This is our commitment.

[+] Give us feedback about our website!