Data Security and Compliance

We've Got You Covered

iCapture ensures that the data delivered to your tech stack remains clean and consistent. Our template architecture takes into account the field types and required fields to ensure a successful delivery with every lead captured.

Our level of security includes GDPR, CCPA, and SOC 2 compliance, which ensures the data you are collecting is safeguarded.

Encryption

Data is encrypted in transit with TLS 1.2. Data is encrypted at rest with AES.

Continuous Monitoring

Independent third-party penetration, threat, and vulnerability testing.

Data Handling

iCapture is in full compliance with GDPR and has support for data deletion.

SSO

User access controls with single sign on.

Secure Hosting

iCapture’s cloud environments are backed by Google's security measures.

RBAC

Role based account access workflows.

POWERING EVENTS FOR COMPANIES AROUND THE WORLD

 

Penetration Testing

We perform an independent third-party penetration test at least annually to ensure ongoing protection.

Security Training

Our team goes through employee security awareness training covering industry standard practices.

Third-Party Audits

Our organization undergoes independent third-party assessments to test our security controls.

Roles and Responsibilities

Roles and responsibilities related to our information security program are well defined and documented.

Information Security Program

Our information security program follows the criteria set forth by ISO 27001 and SOC 2.

Continuous Security Monitoring

We continuously monitor our security and compliance status to ensure there are no lapses.

Interested in knowing more?

Learn about how iCapture can help you maximize your leads with a 1:1 demo with one of our specialists.