SOC 2® Compliance

Information security is a serious concern for financial organizations. Mishandled data can leave enterprises vulnerable to attacks, including data theft, extortion and malware installation.

Today, data privacy is a fundamental right, and data security is imperative to all of our customers. At Trinity, our top concern is ensuring your business is safe and secure.

The SOC 2® audit assures information security to banks and lending organizations because it requires service providers to securely manage data. To protect interests and privacy, security-conscious businesses consider SOC 2 compliance as a critical component and requirement for all of their providers.

How is SOC2 Attained?

Issued by a licensed CPA firm, a SOC 2 Report assesses a service provider’s internal controls and processes and ensures it meets the standards of the Trust Services Criteria.

To manage the SOC 2 process, the American Institute of CPAs (AICPA) issued five “trust service principles” to consider and include: Security, Availability, Integrity processing, Confidentiality, and Privacy. Not all five apply to every business.

Trinity and SOC 2

Trinity achieved both the SOC 2 Type I and Type II attestations in 2019, authorized in the security and the availability trust service principles. These principles are most relevant to the services we offer to our clients.

Trinity’s SOC 2 reports were issued by KirkpatrickPrice, (hyperlink of a licensed CPA firm specializing in information security, with expert auditors who hold Trinity’s controls and processes to a high standard.

And, we aren’t stopping there. Trinity will undergo annual SOC 2 audits to ensure all requirements are met, controls evolve with the threat landscape, and ultimately, remains compliant.

This is our commitment.

“Protecting our customers’ most critical assets is not only our job – it’s a commitment that goes to the very heart of our relationship with each and every client.” – Steve Fontaine

[+] Give us feedback about our website!