Data is Confidential and Secure - AICPA SOC 2 - Features

The security and availability of your Gun StoreMaster firearm records is very important.  We don't just boast about security, we back it up by AICPA SOC 2 independent auditing.  Auditing designed to ensure our computing systems and procedures meet stringent industry standards.  


Data is Available, Confidential and Secure - AICPA SOC 2 


 

Our company is committed to information confidentiality, security and availability - so much so that we subject ourselves to independent audits under the AICPA's SOC 2 program for service organizations.
 
 
SOC 2®
A SOC 2 examination is a report on controls at a service organization relevant to security, availability, processing integrity and confidentiality. SOC 2 reports are intended to meet the needs of a broad range of users that need detailed information and assurance about the controls at a service organization relevant to security, availability, and processing integrity of the systems the service organization uses to process users’ data and the confidentiality and privacy of the information processed by these systems.
 
These audited reports can play an important role in:
 
  • Oversight of the organization
  • Vendor management programs
  • Internal corporate governance and risk management processes
  • Regulatory oversight


That's why we don't just boast about having computer servers only in the U.S. (we do), or that the data is backed up (it is, nightly and in separate physical U.S. locations), or that we employ sophisticated encryption technologies (we do). Our systems and procedures are TESTED by independent auditors.

We undergo rigorous testing and auditing of both our computing systems and procedures in order to satisfy the AICPA SOC 2 standards. Our cloud based computing environment is entirely based in the United States, located in multiple availability zones with Amazon Web Services.  Our computing infrastructure design is highly scalable, which means when transaction volumes spike, we have capacity to handle the increase. Data is encrypted in transit and in motion.

We test our security processes and monitor global computing threats to minimize the potential for down time or data loss. Don't just take someone's word, ask how they verify their security measures are effective.

We treat your data in Gun StoreMaster very seriously.

Subscription Level: ALL