Security Skip to content
Entering the Brazilian iGaming market? Discover GeoComply Brazil's tailored solutions!
Learn More

Security

Security-geocomply

Our platform prioritizes security, compliance, and privacy as essential
elements

We strive to offer secure solutions that meet compliance requirements and engender trust. Our Trust Center offers information about our security and trust initiatives. Additional documentation and certification evidence can be found in our Security Portal.

geolocation_compliance

Platform Security & Compliance

At GeoComply, we recognize the importance of product security and compliance in today’s complex and ever-changing digital environment. We understand that companies, regardless of location, face increasing security and compliance demands. That’s why we make significant investments in information security. Not only is it essential to protect our customers, but it also makes good business sense as we firmly believe trust is established through security.

Information Security Program

Our Information Security Program (ISP) covers all aspects of our products and business operations. This program is intentionally designed to ensure a safe environment for our employees, customers, systems and the data we handle. It includes various technical and organizational security measures to protect our product environments and company systems, such as access controls, personnel training, physical security, network and cloud security, credential and key management, and software development life cycle policies and practices.

chargeback-geocomply

logo-SOCII

SOC 2 Compliance

Our ISP is regularly audited by a third-party auditor as part of a SOC 2 audit, and we maintain SOC 2 certification as a result of these audits. SOC 2 is a report that evaluates an organization’s information systems with regards to security, availability, processing integrity, confidentiality, and privacy, based on the Auditing Standards Board of the American Institute of Certified Public Accountants’ (AICPA) Trust Services Criteria (TSC). We can provide our customers with the most recent SOC 2 report upon request and under a non-disclosure agreement via our Security Portal.

To report a vulnerability, please visit our Vulnerability Disclosure Program. We appreciate your help in keeping our systems secure.