Skip to main content
Log in

Integrations

Announcing Hightouch's SOC 2 Type II Compliance

Hightouch has achieved SOC 2 Type II compliance for the security, availability, and confidentiality trust service principles.

Luke Kline.

Luke Kline

September 3, 2021

2 minutes

Announcing Hightouch's SOC 2 Type II Compliance.

The Story of Hightouch: Giving You Control of Your Data

Early this year we achieved SOC Type I compliance, but that wasn’t enough for us because we wanted to meet the strict regulations and requirements of every industry. The story of how Hightouch began is fundamentally a story about security. From the beginning, Hightouch has been architected to work on top of the data you already own, in your warehouse, rather than being a data store ourselves. It's even possible to store the entirety of our caches and temporary stores within your own cloud environment. This novel architecture is inherently more secure and simplifies much of the work around compliance.

The Latest Step in Our Security Journey: Soc 2 Type II Compliance

While the architecture of Hightouch sets up a solid foundation for security, it doesn't negate the need for other security best practices and proper internal controls. As such, our team has made these a priority and we're happy to announce that we've reached SOC 2 Type II certification.

SOC 2 compliance is an additional sign that Hightouch sets the security of your data as a top priority. With peace of mind that data is flowing securely between your warehouse and your SaaS tools with Hightouch, you can focus more time on your customers.

What Does Soc 2 Type II Compliance Mean?

SOC 2 Type II compliance means that a trusted external auditor deeply reviewed Hightouch's internal operations, based on standards set by the AICPA, and deemed that Hightouch follows top security practices. Hightouch received certification for the following three principles.

  • Security: our protection of customer information during its collection, creation, use, processing, transmission, and/or storage
  • Confidentiality: our ability to protect information that’s designated as confidential from its initial collection through its disposal.
  • Availability: whether our customers can access our products. This includes system uptime, monitoring, and maintenance.

SOC 2 Type II proves that we have demonstrated these core principles over a long period of time and will continue to do so.

How Can I Find More Details About the Hightouch SOC 2 Type II Report?

If you are an existing Hightouch customer, you can reach out to us to share our SOC 2 audit report. If you are not yet a customer but are considering Hightouch, we can provide you with our SOC 2 audit report under NDA.

More on the blog

  • What is Reverse ETL? The Definitive Guide .

    What is Reverse ETL? The Definitive Guide

    Learn everything there is to know about Reverse ETL, how it fits into the modern data stack, and why it's different than ETL.

  • The CDP As We Know It Is Dead: Introducing the Composable CDP.

    The CDP As We Know It Is Dead: Introducing the Composable CDP

    Learn why CDPs are dead and how you can take advantage of the data warehouse.

  • What is Data Activation?.

    What is Data Activation?

    Learn everything to know about Data Activation, what it is, why it matters, and how you can get started activating your data today.

Table of contents

The Story of Hightouch: Giving You Control of Your DataThe Latest Step in Our Security Journey: Soc 2 Type II ComplianceWhat Does Soc 2 Type II Compliance Mean?How Can I Find More Details About the Hightouch SOC 2 Type II Report?

Share

Sign up for our newsletter

Ready to activate your data?

Get startedBook a demo