trust.flocksafety.com Open in urlscan Pro
63.35.51.142  Public Scan

URL: https://trust.flocksafety.com/
Submission: On July 03 via automatic, source certstream-suspicious — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

REQUEST ACCESS




Trust Center
Trust Report
Trust@flocksafety.com



Trust Center


PROTECTING COMMUNITIES IS OUR #1 PRIORITY

Flock Safety's Security Team has created robust policies, procedures, and
controls that are regularly audited by third parties, so you can feel confident
about the safety of your data.





HOW FLOCK EARNS YOUR TRUST

We promote the responsible use of technology and maintain operational
resiliency, which is why we’ve implemented controls to safeguard the privacy and
security of sensitive customer data. These safeguards are routinely assessed by
third parties to ensure continuous adherence to industry standards.


SECURITY

The protection of our customers’ data is essential, and we prioritize secure
design, data integrity, and operational resiliency for all of our products and
systems.

Learn More



RESPONSIBLE AI

Our technology enables and accelerates our customers’ work, and we build systems
with requirements to perform as intended while promoting societal values and
centering on human responsibility.

Learn More



COMPLIANCE

Our entire company relentlessly focuses on adhering to applicable laws,
regulations, and industry frameworks, and we aggressively seek certifications to
demonstrate our ongoing commitment.

Learn More

Security


PROTECTING YOUR DATA

Flock Safety’s systems protect your data by taking a security-by-default
approach. We design and build our platform and devices using availability,
scalability, and security best practices.


ROBUST PRODUCT SECURITY PROTECTIONS 

Our products and devices are embedded with advanced security protections,
including identity management, a high degree of authentication requirements, and
data protection designed into edge devices. We also build products using secure
software principles and maintain a bug bounty program.


MULTI-LAYERED INFRASTRUCTURE SECURITY

Our cloud and network infrastructure employs multi-layered security controls,
leveraging Amazon Web Services, which is designed for stringent government
security requirements and includes advanced encryption, role-based access
controls, and the secure configuration of technology assets.


OPERATIONAL RESILIENCY

Our Security Operations team continuously monitors our fleet of devices and
infrastructure for malicious activity, and we are proud of the operational
resiliency that our effectiveness affords us.

Responsible AI


OUR PRINCIPLES FOR HELPING KEEP COMMUNITIES SAFE WITH AI


BUILDING PARTNERSHIPS

We consistently work with private entities, public organizations, and research
organizations to explore the intersection of ethics, safety, and AI.


RISK MANAGEMENT

We've adopted the National Institute of Systems & Technology (NIST) AI Risk
Management framework to aid us in the responsible design and development of AI
systems.


TRUSTWORTHY AI

We've established an internal Responsible AI Committee to advise our adoption of
AI in a way that is mindful of the potential risks involved.


Compliance


COMPLIANCE & ATTESTATIONS

Flock Safety's Compliance Program helps customers understand our robust controls
for securing data and ensuring service availability. We recognize our role in
the compliance network and diligently adhere to relevant Cybersecurity Laws,
Regulations, Attestations, and Frameworks that matter to our customers.


SOC 3

Overview of our Service Organization Controls relating to Security,
Availability, and Confidentiality Trust Services Categories.

Request Report


SOC 2 (TYPE 2)

Aligned to Security, Availability, and Confidentiality Trust Services
Categories.

Request Report


CLOUD SECURITY ALLIANCE’S CAIQ

Assessment of and alignment to a comprehensive framework that identifies cloud
responsibilities and mitigates risks with shared computing models.

Request Report


HECVAT

The Higher Education Community Vendor Assessment Tool (HECVAT) is a security
assessment that applies to our customers in higher education.

Request Report


NIST CYBERSECURITY

Adoption of policies, procedures, and security controls necessary to identify,
protect, detect, respond, and recover from cybersecurity events.




CJIS

Adoption of requirements designed to protect criminal justice information and
provide secure access for law enforcement.




HIPAA

Flock provides assurances that we will comply with your requirements for HIPAA
Privacy, Security, and the HITECH Act.

Request Report


FERPA

Implementation of controls to meet requirements to safeguard student
information.


Terms of ServicePrivacy PolicyLegal
2023 Flock Safety. All rights reserved.