As a security company that prescribes guidance to others on InfoSec best practices, it is paramount for Tugboat Logic to practice what we preach. One of the core things we advise is not to just be secure, but be able to prove it to your customers so they will trust you with their data.
At Tugboat Logic, we take security very seriously, and have taken great measures to ensure all necessary security controls have been implemented, and we continuously collect evidence to prove these controls are constantly in place. In addition, we have engaged with an independent auditor to attest that the Tugboat Logic Virtual CISO Platform solution complies with the stringent criteria of SOC 2, which includes the five core principles of Security, Privacy, Confidentiality, Processing Integrity, and Availability.
In order to maintain a high level of transparency with our clients, the following documents are available upon request.
A summary report of the security posture of our company and product to help you understand what we do, what data we collect, and how we protect that data. Available upon request.
A comprehensive report of all the information security policies and controls implemented at Tugboat Logic, designed to provide further detail than is available in the Security Assurance Report. Available upon request.
The policies and procedures that apply to the collection, security, use and disclosure of any of your personal data collected by Tugboat Logic. It also describes your choices regarding use, access and correction of your personal information.