Compliance And Security

Compliance and trust is what we do, all over the world

Relationships are built on trust, and you expect the same for your business. As your Data Residency and Protection partner, we hold ourselves to the highest standards in the industry. That’s why we’re constantly improving our solutions by staying ahead of the latest trends, building security into every layer of offerings, and adapting to the latest compliance standards.

Compliance

Compliance is within our DNA. We are constantly working to ensure our solutions meet the latest compliance & regulatory standards worldwide. We undergo external audits and reviews to ensure our services are ready for market changes which could disrupt ensuring your business is not disrupted.


AISPA SOC logo

SOC 2 Type II

InCountry has obtained a SOC 2 Type II (Service Organization Controls) report based on the AICPA Trust Service Principles (TSP) and Criteria and covers the security, availability and confidentiality TSPs as they relate to a Cloud Service Provider (CSP). Request Report

AISPA SOC logo

SOC 3

A SOC 3 (Service Organization Controls) report is an abbreviated version of a SOC 2 report and is appropriate for users who want assurance about the Cloud Service Provider’s (CSP) controls but do not require a full SOC 2 report. A SOC 3 report may only be issued if the CSP has an unqualified audit. Download

PCI DSS logo

PCI DSS

The Payment Card Industry-Data Security Standard (PCI-DSS) is an industry level information security standard regarding the secure handling of credit card information.

HIPAA logo

HIPAA

The Health Insurance Portability and Accountability Act (HIPAA) provides U.S. federal protections for patient health information held by Covered Entities (CEs) and Business Associates (BAs).

Security

Security is a key focus area for our organization and product engineering. Rest assured your data is managed by a security-minded organization to the highest security and privacy standards. We use industry-standard encryption standards to enable the security and privacy of your data in every phase of our operations.


Product security logo

Product security

Our processes, standards, policies, and tools help keep security integral to product design, architecture, implementation and operation. Security is extremely important to us. Thorough code reviews and vulnerabilities testing is a core part of our product delivery.

Cybersecurity sign

Cybersecurity

Preventative controls and measures guard data from security breaches with threat detection and continuous monitoring and response.

Secure development lifecycle

Secure Development Lifecycle

All products follow a defined SDLC program which requires at a minimum detailed threat modeling, manual and automated code reviews, vulnerability scans, developer training, privacy reviews, penetration testing and image and server hardening. By keeping a measurable and consistent secure development lifecycle (SDLC), we’re able to improve trustworthiness and product resilience. The tools and processes we keep adding promote a culture of security and privacy awareness.

Encryption sign

Encryption

We protect your data with industry standard encryption methods including AES-256 for data at rest and TLS1.2 for data in transit.

Privacy

We respect and protect the rights of individuals, particularly data protection and privacy during the processing and use of information. We are committed to protecting the privacy of our customers’ data and preventing it from unauthorized access. Our privacy policy and data processing agreements help us act our values in all our output, including technology products and marketing content, and abide to all related laws, worldwide.



Privacy by Design
InCountry does not access or sell customers data. Your data is yours.

 

 

Our Ethical Stand
Our mission is to help companies expand their business into new countries by addressing data residency and protection challenges. We do so by addressing data residency requirements with local regulations and securely and privately localizing regulated data, such as Payment Card Information (PCI), Protected Health Information (PHI), Personally Identifiable Information (PII). InCountry does not collect or store any information beyond what is required to operate the service. We do not handle or store social media posts, text messages, instant messages, personal photographs or phone logs. InCountry is committed to conducting business with the highest degree of ethical values and has dedicated resources for maintaining compliance with regulatory and legal requirements.

InCountry ISInCountry IS NOT
Profile dataSocial media posts
Finance dataText messages
Payment dataInstant messages
Health dataPersonal photographs
Employee dataPhone logs
  • EU General Data Protection Regulation
  • Data Protection and Privacy Agreements
  • Internal Data Protection
  • The European Union (EU) passed the GDPR to give individuals more control over their personal data. GDPR imposes more rules about processing PII and comes with powerful enforcement. We invest significant strategic resources in maintaining compliance with the GDPR and we also aim to help our customers comply with the processes and policies outlined.
    GDPR trust center
  • InCountry’s privacy policy describes what data InCountry collects, how we use and protect this data, retention periods for customer data and customer rights regarding use of their data. Our policies enable us to comply with related privacy and data protection laws. It defines requirements for processing and accessing personal data, and establishes clear responsibilities and organizational structures. This means that your data is safe with us.
    Data protection trust center
  • InCountry employees are regularly trained and tested for a high level of data privacy awareness. Internal teams regularly test the effectiveness of privacy and security controls to confirm we continue to maintain the appropriate level of protection of data.
    Data protection meeting

Guidelines for Law Enforcement

To protect customers’ rights and data privacy, we only provide customer information to law enforcement agencies or government entities after the customer has been notified and all legal processes and procedures have been followed as prescribed by law, unless we are explicitly prohibited from doing so by law.