Lotlinx | Trust Center
Lotlinx Trust Center
Lotlinx prioritizes your data's security and confidentiality. Our Trust Center offers insights into our data management, security measures, and compliance.
See

Resources

SOC 2 Type 1 Report

Privacy Policy

FAQs

Yes, You can request a copy above. Prior to receiving a copy of our SOC 2 Type 1 1 report, we will need a singed NDA.
Lotlinx maintains robust security practices to ensure that our customers' data are maintained to the highest degree.

Subprocessors

Google Cloud Platform

Infrastructure Service Provider

Gitlab

Git Repository Manager

Amazon Web Services

Infrastructure Service Provider

Azure

Infrastructure Service Provider

Monitoring

Continuously monitored by Secureframe

Compliance

SOC 2 Type 1

Monitoring

Organizational Management

Background Checks
Background checks or their equivalent are performed before or promptly after a new hires start date, as permitted by local laws.
Code of Conduct
A Code of Conduct outlines ethical expectations, behavior standards, and ramifications of noncompliance.
Disciplinary Action
Personnel who violate information security policies are subject to disciplinary action and such disciplinary action is clearly documented in one or more policies.

Risk Assessment

Risk Assessment
Formal risk assessments are performed, which includes the identification of relevant internal and external threats related to security, availability, confidentiality, and fraud, and an analysis of risks associated with those threats.
Risk Register
A risk register is maintained, which records the risk mitigation strategies for identified risks, and the development or modification of controls consistent with the risk mitigation strategy.

Access Security

Asset Inventory
A list of system assets, components, and respective owners are maintained and reviewed at least annually
Unique Access IDs
Personnel are assigned unique IDs to access sensitive systems, networks, and information

Communications

Communication of Security Commitments
Security commitments and expectations are communicated to both internal personnel and external users via the company's website.
Privacy Policy
A Privacy Policy to both external users and internal personnel. This policy details the company's privacy commitments.