Skip to main content
Skip table of contents

Redpoint's security standards and compliance

Data security and compliance are critical for any organization handling sensitive information. Redpoint Global demonstrates a steadfast commitment to protecting its clients' data by achieving ISO 27001, SOC 2 Type 2, and HIPAA compliance. These certifications not only underscore Redpoint's dedication to maintaining the highest standards of information security but also provide customers with the confidence that their data is in safe hands. In this article, we delineate what each of these certifications entails and how Redpoint has successfully met the rigorous criteria to earn them.

ISO 27001

Redpoint is ISO 27001 compliant.

What is ISO 27001?

  • ISO 27001: An international standard for information security management systems (ISMS), published by the International Organization for Standardization (ISO). It provides a systematic approach to managing sensitive company information, ensuring its confidentiality, integrity, and availability.

  • Certification Process: Involves a rigorous audit by an accredited certification body to verify that the organization’s ISMS meets the requirements of the standard.

For more information, refer to https://www.iso.org/standard/27001.

Relevance to Redpoint

  • Comprehensive Security Framework: Establishes a robust framework for managing information security risks, including data breaches, unauthorized access, and other cyber threats.

  • Continuous Improvement: Encourages ongoing assessment and improvement of security practices, ensuring the company adapts to new threats and regulatory changes.

  • Global Recognition: ISO 27001 is internationally recognized, enhancing Redpoint's reputation and credibility across global markets.

SOC 2 Type 2

Redpoint is SOC 2 compliant. 

What is SOC 2 Type 2?

  • SOC 2 (Service Organization Control 2): A report developed by the American Institute of Certified Public Accountants (AICPA). It evaluates the effectiveness of an organization’s controls over information systems relevant to security, availability, processing integrity, confidentiality, and privacy.

  • Type 2 Report: Unlike a Type 1 report, which assesses the design of controls at a specific point in time, a Type 2 report evaluates the operational effectiveness of those controls over a defined period, typically 6-12 months.

Relevance to Redpoint

  • Trust and Assurance: Demonstrates to clients and partners that Redpoint maintains high standards for protecting data and ensuring reliable service operations.

  • Security Practices: Validates that Redpoint’s security controls are not just well-designed but also effectively implemented and maintained over time.

  • Client Confidence: Provides assurance that sensitive marketing data and customer information are handled with strict security measures, increasing client trust and satisfaction.

HIPAA

Redpoint is HIPAA compliant. 

What is HIPAA?

  • HIPAA (Health Insurance Portability and Accountability Act): A U.S. federal law designed to protect sensitive patient health information. It sets standards for the protection of health data and applies to entities handling such information, including health plans, healthcare clearinghouses, and certain healthcare providers, as well as their business associates.

Key components

  • Privacy Rule: Governs the use and disclosure of protected health information (PHI).

  • Security Rule: Specifies safeguards to ensure the confidentiality, integrity, and availability of electronic PHI (ePHI).

  • Breach Notification Rule: Requires covered entities and business associates to provide notification following a breach of unsecured PHI.

For more information, refer to https://www.hhs.gov/hipaa/index.html.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.