System Surveyor announced the successful completion of its SOC 2 Type 1 compliance, marking an achievement for the company whose intelligent, all-in-one system design platform streamlines site surveys, facilitates collaborative designs and provides a digital as-built documentation of a complete security system to help its users save time, win projects and simplify their work.

Established by the American Institute of Certified Public Accountants (AICPA), the SOC 2 Type 1 audit and examination ensures the personal assets of their potential and existing customers are protected to build trust and confidence in the service performed and controls related to the services through a report by an independent CPA. SOC 2 Type 1 reports are recognized globally and affirm that a company's infrastructure, software, people, data, policies, procedures and operations have been formally reviewed.

By undergoing a thorough review process, during which System Surveyor established proof of policies, procedures and control activities that ensure the security of their customers’ sensitive data, infrastructure, business practices and software code, System Surveyor reaffirmed its commitment to provide customers with confidence that their information is secure.

“In today’s hyper-connected world, all companies and organizations are concerned about the security of their data accessed and stored by their business partners, and appropriately so,” said System Surveyor CEO Chris Hugman. “We want our customers to know that System Surveyor is committed to protecting customer information — not just on our platform, but also in our day-to-day business practices. This SOC 2 Type 1 Certification is clear evidence of that commitment.”

As a SOC 2 Type 1 compliant organization, System Surveyor provides its security industry ecosystem customers with strong third-party validation of its compliance systems, offering stringent protection for all internal and customer-facing systems against unauthorized access, unauthorized disclosure of information and damage to systems that could compromise the confidentiality of information or systems.

For more information, visit: