Overview

Certinia applications were designed from the ground up using core information security principles:

Certinia is committed to achieving and maintaining these principles and the trust of our customers. Integral to this is providing a robust information security and privacy program that carefully considers security and data protection across our services, including data submitted by customers to our services (“customer data”). Over 1000 customers in 34 countries trust Certinia applications. Our customers are in a wide range of verticals, some with stringent security requirements, including financial services, healthcare, technology, energy and government.

Security at Certinia

Certinia has a dedicated Information Security function led by our Chief Information Security Officer and driven by a risk-based information security strategy. Our security policy and standards, controls and verification efforts are designed to protect customer information assets against a range of rapidly evolving threats. Our Information Security Program includes identifying, mitigating and reporting on information and cyber security risks, and complying with security and privacy regulations and commitments.https://securityscorecard.com/security-rating/badge/financialforce.com

Attack Surface Management

Certinia uses state-of-the-art security technology to protect our digital landscape, including input from industry leading vendors and custom-built Attack Surface Management solutions designed to harden and reduce our attack surface.

Cloud Security Alliance

As part of our commitment to Trust, Certinia has made available to the public a detailed description of our cloud security controls under the Cloud Security Alliance (CSA) STAR Level 1 – Self-Assessment program. This self-assessment uses the CSA Consensus Assessments Initiative Questionnaire to answer nearly 300 standardized questions that provide transparency into cloud vendor security practices and controls supporting their cloud service delivery and applications.

Attestations

Certinia Applications

Service Organization Controls (SOC) Reports

As part of our commitment to Trust, Certinia maintains the American Institute of Certified Public Accountants (AICPA) Service Organization Controls (SOC 1 Type II, SOC 2 Type II and SOC 3) attestations. The SOC 1 Report helps to provide Certinia customers with the assurance that our applications are developed and delivered in accordance with transparent standards designed for quality and security. The SOC 2 Report gives assurance over controls around security, availability, and confidentiality of customer data. The SOC 3 Report report outlines information related to a service organization’s internal controls for security and confidentiality, as principles in-scope for Certinia.

The SOC Reports provide our customers assurance that the Certinia Description of Services is fairly presented in all material respects, that controls put in place by Certinia are suitably designed to meet their control objectives, and that those controls were tested and operated effectively during the audit period.

If you would like to request a copy of our SOC 1 Type II or SOC 2 Type II Reports, please get in touch with your Certinia Account Executive.

HIPAA

The safety, security and availability of our customers’ data is a top priority of Certinia. As part of this commitment, Certinia supports compliance with the U.S. Health Insurance Portability and Accountability Act (HIPAA) by our customers that are covered entities or business associates under HIPAA.

Certinia complies with the requirements of the HIPAA Security Rule that apply to Certinia in its capacity as a business associate. In addition, Certinia applications provide configurable security features that can help our customers address their security and compliance requirements under HIPAA.

Certinia customers that are subject to HIPAA and wish to use our applications for electronic Protected Health Information (ePHI) must first sign a Certinia business associate addendum.

Please review our Certinia and the HIPAA Security Rule whitepaper for an overview of Certinia application features and controls relevant to the HIPAA Security Rule and how our customers can leverage those controls to meet HIPAA compliance requirements.

Additional Security Resources

Certinia Privacy and Data Protection
Certinia Security Whitepaper

If you have a security or privacy related question, comments or concerns please contact us.