Security and Privacy at Inverite

At Inverite, safeguarding end-user data is our highest priority and a key measure of our success, both for ourselves and our clients. We spare no effort in maintaining regulatory compliance and implementing top-tier security controls and procedures.

Governence

  • SOC 2 compliant

  • PIPEDA compliant

  • Ongoing Monthly Security Testing

Infrastructure

  • IP whitelisting and Virtual Private Network

  • HTTPS 256-bit encryption

  • Strong authentication mechanism

Data and Storage Controls

  • Storage of sensitive data is highly secured and not accessible by customers or end-users.

  • AES-256 hardware encryption

  • All data can be deleted upon request

Policies

  • SOC 2 compliant emergency response and disaster recovery plan

  • Strong logical access controls

  • Industry-leading Risk & Change Management policies

Privacy & Terms

Privacy

Inverite adheres to the highest levels of privacy when it comes to protecting end user information. Our Privacy Policy is available here

Terms

Our Terms of Service is available here

Questions about how Inverite can fit into your business?

Our team of experts can help you find the right solutions. Book a demo today!

Proud members of:

Technology partners: