Security and Compliance

Last updated: Feb 2024


SOC 2 Type 2

SOC 2 Type 2 (SOC 2) is a report based on the Trust Services Criteria (TSC) and provides an in-depth review of an organization's controls over time. It evaluates the effectiveness of these controls in addressing security, availability, processing integrity, confidentiality, and privacy of a system. At Protean Labs, we adhere to all the guidelines of SOC 2 Type 2 to ensure the security and privacy of our systems and data.

We are currently in the process of obtaining our attestation and will update here upon completion.


ISO 27001

ISO/IEC 27001 (ISO 27001) is the leading international standard for information security, created to help organizations of any size or industry protect their information through the adoption of an Information Security Management System (ISMS). It provides a framework and guidelines for establishing, implementing, and managing an ISMS, requiring organizations to identify information security risks and select appropriate controls to address them.

We are currently in the process of obtaining our certificate and will update here upon completion.


PCI DSS

Payment Card Industry Data Security Standard (PCI DSS) defines the security requirements for any entity handling credit card information. PCI compliance covers all of transmission, storage, and processing of credit or payment information. Compliance with PCI DSS is not mandated by law but is enforced through contractual obligations with payment card companies, and non-compliance can result in fines and other penalties.

Protean Labs uses Stripe for all our payment processing and never handles your payment information.


GDPR

The General Data Protection Regulation (GDPR) is a legal framework that sets guidelines for the collection and processing of personal information of individuals within the European Union (EU).

We are committed to GDPR compliance through:

  • Ensuring transparent data processing practices.
  • Obtaining explicit consent before processing personal data.
  • Implementing robust security measures to protect personal information.
  • Providing individuals with the right to access, rectify, and erase their data upon request.
  • Conducting regular audits to ensure ongoing compliance with GDPR regulations.