Legally-binding E-Signature Solution  |   Discover E-Sign!


AuditDashboard adheres to strict policies and procedures for all operations to protect your data. We invite you to explore and verify our security operations below.

Illustration of a happy security professional using AuditDashboard
Compliance OVERVIEW

As a trusted service provider, AuditDashboard's management team accepts responsibility for establishing, monitoring, and adhering to robust security controls that prevent, detect and mitigate incidents. To hold management accountable, independent accredited third-parties are engaged on a routine basis to perform testing services and audit the effectiveness of AuditDashboard's security, confidentiality, and availability controls.

SOC 2 Type 2 Compliance Icon

SOC 2 Type 2

AuditDashboard has consistently obtained SOC 2 Type 2 reports, adhering to the rigorous System and Organization Controls standards established by the American Institute of Certified Public Accountants (AICPA), every year since 2016. To request a copy of our SOC 2 Type II report, please click here.

Cloud Security Appliance Security, Trust and Assurance Registry (STAR) Icon

Cloud Security Alliance

The Cloud Security Alliance (CSA) Security, Trust and Assurance Registry (STAR) is a free, publicly accessible registry that documents the security controls provided by various vendors. The CSA STAR Continuous Assessment Questionnaire for AuditDashboard is available for download from the Cloud Security Alliance's website here.

Our Identity Partners

We work with industry leaders in the identity management space to streamline access management for both firms and client users.

Risk Management Program Icon

Risk Management

Integrating risk management processes helps AuditDashboard improve decision-making in all areas of operations. AuditDashboard’s management team participates in reviewing, and promoting the risk assessment program throughout the year. Risk assessments are performed annually as well as on a needed basis.

Vendor Management and Assessment Icon

Vendor Management and Assessment

Our sub-service organizations and managed service providers undergo a thorough security and operational vetting assessment as part of our annual vendor review process. They are required, in turn to provide us their regular SOC1, SOC2, and/or ISO/IEC 27001 audit reports as part of our assessment program.


Compliance Standards and Regulations

We actively participate in the security community and work with industry leaders. We obtain industry-accepted certifications and comply with industry standards and regulations. Be assured that your data is secure and compliant with AuditDashboard.

Have a question about compliance?