We at Edge are pleased to share the news that we have recently completed our SOC 2 Type II audit! You can see our live compliance with SOC 2 on our trust page, where your IT team can request permission to see our full report.
Industry-Standard Accreditation
The SOC 2 audit is one of the highest recognized standards of information security compliance in the world. It was developed by the American Institute of CPAs (AICPA) to allow a third-party auditor to validate a service company’s internal controls with respect to information security.
We obtained our audited SOC 2 Report by partnering with Johanson Group who respectively review our internal controls including policies, procedures, and infrastructure regarding data security, firewall configurations, change management, logical access, backup management, business continuity and disaster recovery, security incident response, and other critical areas of our business.
Our report was unqualified, meaning that there were no exceptions identified.
On top of the standard SOC 2 requirements, we added a custom control verifying that we do not train on customer data without permission. That is part of our report. We did not need to add it; in fact, it added an extra hoop for us to jump through. But it was that important for our customers to know we were keeping our promise.
Why does this matter?
Bars all over the country allow for the use of cloud software and they are increasingly coming down on the side of allowing AI software as long as appropriate precautions are taken. In fact, USPTO has even come out to say that the use of AI tools is allowed and not required to be disclosed!
Yet, all of these permissions still have a duty of care. You need to make sure your client’s data is private and that it is not being trained on to prevent regurgitation.
First, by achieving SOC 2, we remove much of the uncertainty around working with us. Not only do you know that an auditor verified our cybersecurity standards to the highest standards, you know what those standards are. This should give greater assurance to your IT teams, compliance teams, and even your insurance.
Our security
Thanks to a company-wide effort here at Edge, and with the help of our trusted partner Johanson Group, we successfully achieved SOC 2 compliance and received an Auditor’s Report, which we are happy to share with you to prove to you that our policies, procedures, and infrastructure meet or exceed the SOC 2 criteria. In fact, by partnering with Johanson Group, we can confidently say we go above and beyond the minimum requirements for SOC 2 by integrating our critical infrastructure to monitor compliance to the SOC 2 framework 24/7/365, not just during the audit window.
We believe the relationship with our customers must be built on trust. The successful completion of our SOC 2 Report is one of many ways that we have planned to earn and retain that trust.
SOC 2 is just one aspect of our growing security program. We are committed to continually improving our information security program and retaining an annual SOC 2 audit to ensure we keep supporting our customers’ needs.
If you want to try what is now the most private and secure patent platform in the market, click below.