Scoreboard AITrust Center

Resource library

Our security, compliance, and policy documentation, including audit reports.

SOC 2 Type 2 Report

January 1, 2026 to April 1, 2026

Apr 2026

Access Management Policy

Describes how user access to systems and data is provisioned, reviewed, and revoked based on roles and business needs, following the principle of least privilege.

Apr 2026

Asset Management Policy

Provides guidance for identifying, classifying, and protecting company-owned assets, ensuring they are tracked, maintained, and security handled throughout their lifecycle.

Apr 2026

Privacy Policy

This policy outlines the organization's commitment to protecting the privacy of personal information in accordance with applicable laws and regulations.

Apr 2026

Vendor Risk Management Policy

Establishes a framework for managing risks associated with third-party vendors, including risk assessment, due diligence, and ongoing monitoring.

Apr 2026

Software Development Policy

Establishes guidelines for secure software development practices, including coding standards, code reviews, and security testing.

Apr 2026

Security Operations Policy

Defines the security measures and protocols for monitoring, detecting, and responding to security incidents within the organization's IT environment.

Apr 2026

Enterprise Risk Management Policy

Establishes a framework for managing risks to the organization's operations, assets, and individuals.

Apr 2026

Information Security Roles and Responsibilities Policy

Defines the roles and responsibilities for information security within the organization, ensuring accountability and effective management of security risks.

Apr 2026

Information Security Policy

Establishes the framework for managing and protecting sensitive information assets, ensuring confidentiality, integrity, and availability.

Apr 2026

Incident Response Plan and Policy

Outlines how the organization detects, reports, investigates, and responds to security incidents to minimize impact and support recovery and compliance obligations.

Apr 2026

Human Resources Security Policy

Details the process for managing human resources security risks, including employee screening, training, and termination procedures.

Apr 2026

Data Management Policy

Describes how data is classified, handled, and protected throughout its lifecycle, ensuring compliance with legal and regulatory requirements.

Apr 2026

Business Continuity and Disaster Recovery Policy

Establishes plans for maintaining operations during outages or crises, and outlines recovery procedures to restore systems and services with minimal disruption.

Apr 2026
Powered by