See how Intrro works every Tuesday at 2pm ET
What and where does Intrro store the data it collects?
Do you fill out security assessments?
Who is the security contact?
Single Sign-On
User Roles
Passwords
Application Infrastructure
Vulnerability Management
Intrusion Detection and Prevention
Logical Separation
Incident Response
Vulnerability Disclosure
Software Development Life Cycle
Data Encryption
Data Subprocessors
New SCCs & the GDPR
California Consumer Privacy Act
High Availability
Business Continuity
Disaster Recovery
Backups
Physical Security
Security Training
Risk Management
Security Policies
Vendor Management
Confidentiality Agreements
Endpoint Security
SOC 2 Type II
1. Definitions
2. Customer Data subject to EU Data Protection Law
3. Purpose and Scope
4. Security
5. Data Subject Rights
6. Customer Personal Data Breach
7. Sub-Processors
8. Audit
9. Impact Assessment
10. Data Deletion
11. Transfer Mechanisms
12. Customer Data subject to CCPA
13. Customer Data subject to LGPD
14. Customer Responsibilities
15. Liability
16. Term and Termination
17. General
Annex 1A
Annex 1B
Annex 1C
Annex 2
Annex 3
Compliance Documentation
Data Subjects Rights
Consent
Data Breach
Unless earlier terminated as provided herein, this DPA shall terminate automatically together with termination or expiry of the Agreement