trust.flocksafety.com
Open in
urlscan Pro
63.35.51.142
Public Scan
URL:
https://trust.flocksafety.com/
Submission: On July 03 via automatic, source certstream-suspicious — Scanned from DE
Submission: On July 03 via automatic, source certstream-suspicious — Scanned from DE
Form analysis
0 forms found in the DOMText Content
REQUEST ACCESS Trust Center Trust Report Trust@flocksafety.com Trust Center PROTECTING COMMUNITIES IS OUR #1 PRIORITY Flock Safety's Security Team has created robust policies, procedures, and controls that are regularly audited by third parties, so you can feel confident about the safety of your data. HOW FLOCK EARNS YOUR TRUST We promote the responsible use of technology and maintain operational resiliency, which is why we’ve implemented controls to safeguard the privacy and security of sensitive customer data. These safeguards are routinely assessed by third parties to ensure continuous adherence to industry standards. SECURITY The protection of our customers’ data is essential, and we prioritize secure design, data integrity, and operational resiliency for all of our products and systems. Learn More RESPONSIBLE AI Our technology enables and accelerates our customers’ work, and we build systems with requirements to perform as intended while promoting societal values and centering on human responsibility. Learn More COMPLIANCE Our entire company relentlessly focuses on adhering to applicable laws, regulations, and industry frameworks, and we aggressively seek certifications to demonstrate our ongoing commitment. Learn More Security PROTECTING YOUR DATA Flock Safety’s systems protect your data by taking a security-by-default approach. We design and build our platform and devices using availability, scalability, and security best practices. ROBUST PRODUCT SECURITY PROTECTIONS Our products and devices are embedded with advanced security protections, including identity management, a high degree of authentication requirements, and data protection designed into edge devices. We also build products using secure software principles and maintain a bug bounty program. MULTI-LAYERED INFRASTRUCTURE SECURITY Our cloud and network infrastructure employs multi-layered security controls, leveraging Amazon Web Services, which is designed for stringent government security requirements and includes advanced encryption, role-based access controls, and the secure configuration of technology assets. OPERATIONAL RESILIENCY Our Security Operations team continuously monitors our fleet of devices and infrastructure for malicious activity, and we are proud of the operational resiliency that our effectiveness affords us. Responsible AI OUR PRINCIPLES FOR HELPING KEEP COMMUNITIES SAFE WITH AI BUILDING PARTNERSHIPS We consistently work with private entities, public organizations, and research organizations to explore the intersection of ethics, safety, and AI. RISK MANAGEMENT We've adopted the National Institute of Systems & Technology (NIST) AI Risk Management framework to aid us in the responsible design and development of AI systems. TRUSTWORTHY AI We've established an internal Responsible AI Committee to advise our adoption of AI in a way that is mindful of the potential risks involved. Compliance COMPLIANCE & ATTESTATIONS Flock Safety's Compliance Program helps customers understand our robust controls for securing data and ensuring service availability. We recognize our role in the compliance network and diligently adhere to relevant Cybersecurity Laws, Regulations, Attestations, and Frameworks that matter to our customers. SOC 3 Overview of our Service Organization Controls relating to Security, Availability, and Confidentiality Trust Services Categories. Request Report SOC 2 (TYPE 2) Aligned to Security, Availability, and Confidentiality Trust Services Categories. Request Report CLOUD SECURITY ALLIANCE’S CAIQ Assessment of and alignment to a comprehensive framework that identifies cloud responsibilities and mitigates risks with shared computing models. Request Report HECVAT The Higher Education Community Vendor Assessment Tool (HECVAT) is a security assessment that applies to our customers in higher education. Request Report NIST CYBERSECURITY Adoption of policies, procedures, and security controls necessary to identify, protect, detect, respond, and recover from cybersecurity events. CJIS Adoption of requirements designed to protect criminal justice information and provide secure access for law enforcement. HIPAA Flock provides assurances that we will comply with your requirements for HIPAA Privacy, Security, and the HITECH Act. Request Report FERPA Implementation of controls to meet requirements to safeguard student information. Terms of ServicePrivacy PolicyLegal 2023 Flock Safety. All rights reserved.