Governance, Privacy, and Security Statement
Updated March 9, 2022
This Security Statement applies to the products, services, websites and apps offered by Trust Science Inc., www.TrustScience.com USA Inc. and their affiliates (collectively “Trust Science”), which are branded as “Trust Science,” except where otherwise noted. We refer to those products, services, websites and apps collectively as the “Services” in this Statement.
Trust Science’s information systems and technical infrastructure are hosted with world-class, SOC 2 compliant cloud providers. Physical security controls at the data centers include 24x7 monitoring, cameras, visitor logs, and entry requirements.
Trust Science is compliant with legislation that covers Credit Reporting Agencies in both Canada and the US and has received an annual Compliance Certificate to that effect from an independent analytics firm. We are working towards SOC 2 certification.
Access to Trust Science’s technology resources are only permitted through secure connectivity (e.g., VPN, SSH) and requires multi-factor authentication. Our production password policy requires complexity, expiration, and lockout and disallows reuse. Trust Science grants access on a need to know basis of least privilege rules, reviews permissions quarterly, and revokes access immediately after employee termination.
Trust Science maintains and regularly reviews and updates its information security policies, at least on an annual basis. Employees must acknowledge policies on an annual basis and undergo additional security awareness training and skills development and/or privacy law training for key job functions.
Trust Science conducts background screening at the time of hire. In addition, Trust Science communicates its information security policies to all personnel (who must acknowledge this) and requires new employees to sign non-disclosure agreements, and provides ongoing privacy and security training.
Dedicated Security Personnel
Trust Science also has a Cyber Security team which focuses on application, network, and system security. This team is also responsible for security compliance, education, and incident response.
Vulnerability Management and Penetration Tests
Trust Science maintains a documented vulnerability management program which includes periodic scans, identification, and remediation of security vulnerabilities on application and infrastructure. All networks, including test and production environments, are regularly scanned using trusted third party vendors. By leveraging world-class cloud service providers, critical patches are always applied to the Trust Science production and test environments.
We encrypt your data in transit using secure TLS cryptographic protocols. All client data is also encrypted at rest in all environments.
Our development team employs secure coding techniques and best practices. As part of ongoing security awareness training, developers are made aware of secure coding practices that must be followed in the development of Trust Science products.
Development, testing, and production environments are separated. All changes are peer reviewed and logged for performance, audit, and forensic purposes prior to deployment into the production environment.
Trust Science maintains an asset management policy which includes identification, classification, retention, and disposal of information and assets. Company-issued devices are equipped with full hard disk encryption and up-to-date antivirus software.
Information Security Incident Management
Trust Science maintains security incident response policies and procedures covering the initial response, investigation, customer notification (no less than as required by applicable law), public communication, and remediation. These policies are reviewed regularly and tested bi-annually.
Despite best efforts, no method of transmission over the Internet and no method of electronic storage is perfectly secure. We cannot guarantee absolute security. However, if Trust Science learns of a security breach, we will notify affected users so that they can take appropriate protective steps. We are committed to keeping our customers fully informed of any matters relevant to the security of their account and to providing customers all information necessary for them to meet their own regulatory reporting obligations.
Information Security Aspects of Business Continuity Management
To maximize availability, the Trust Science Services are hosted from enterprise-class data centers managed by public cloud providers. This infrastructure is divided into ‘Availability Zones’ or AZ. Availability Zones are connected to automatically fail-over between Availability Zones without interruption. Highly resilient systems, and therefore service availability, is a function of the system design. Through the use of Availability Zones and data replication, Trust Science can achieve extremely short recovery time and recovery point objectives, as well as the highest levels of service availability
Logging and Monitoring
Application and infrastructure systems log information to managed log repositories for troubleshooting, security reviews, and analysis by authorized Trust Science personnel.
Keeping your data secure also requires that you maintain the security of your account and API keys by using sufficiently complicated passwords and storing them safely. You should also ensure that you have sufficient security on your own systems. We also offer TLS and SFTP to secure the transmission of data.