We’re thrilled to announce that Bird Eats Bug has successfully completed a SOC 2 Type I audit and received a clean report with NO exceptions. This is a massive accomplishment for our team, and we want to share a little about what it means for our customers.
What is SOC 2?
SOC 2 is a standard developed by the American Institute of Certified Public Accountants (AICPA) that sets forth criteria for how service organizations must manage their information security concerning the five trust services criteria: security, confidentiality, availability, process integrity, and privacy. An independent third party conducts the audit itself (in our case, the audit was carried out by Prescient Assurance). It assesses whether an organization or company has adequate controls in place to protect the security, availability, and confidentiality of its systems and data.
Why SOC 2 matters to our customers
We know that our customers entrust us with a lot of sensitive data, so completing this audit was our top priority. Earning the SOC 2 designation demonstrates our commitment to data security and gives our customers the peace of mind that comes with knowing their information is safe with us. In fact, many of our customers require SOC 2 compliance as part of their own internal security requirements.
The audit process was rigorous, and earning a SOC 2 audit report is no small feat, but we’re so proud of our team for successfully completing the audit with no exceptions! Finally, we want to thank our customers for entrusting us with their data—this designation is a testament to our commitment to keeping our customers’ data safe and secure.
Coming next: SOC 2 Type II
The journey to enhance the security of your data with Bird Eats Bug is not over yet. With SOC 2 Type I achieved, our next natural step is to pursue a clean SOC 2 Type II audit report. The second type of SOC 2 audit is more comprehensive than the first, as it assesses not only how well we followed procedures but also their effectiveness over time, for a minimum of three months, ensuring whether systems and controls in place are functioning around the clock.
If you have any questions regarding SOC 2 or would like to request a copy of our SOC 2 Type I audit report, don’t hesitate to contact us at email@example.com.