ConnectOn Trust Center

At ConnectON, we prioritize privacy, security, and compliance. Our commitment to these values means that we have implemented strict policies and procedures to protect your data and provide a safe and secure experience when using our services. Whether it’s our privacy policy, our dedication to identifying and addressing vulnerabilities, or our certifications in SOC 2, you can trust that ConnectOn has your best interests in mind.

We are committed to complying with all applicable laws and regulations governing the collection, use, and disclosure of personal information. Our privacy policy is designed to be transparent and easy to understand, so you can be confident that your data is in safe hands. We believe that protecting your privacy is essential to building and maintaining your trust, and we take this responsibility very seriously. Privacy Policy You own your data and we are committed to keeping it private. Our privacy policy clearly describes when we collect your information and the steps we take to protect it.

Privacy Policy

You own your data and we are committed to keeping it private. Our privacy policy clearly describes when we collect your information and the steps we take to protect it.

Terms Of Service

Our Terms of Service outlines the guidelines, rules, and regulations that govern the use of our platform and services. By reading and agreeing to our Terms of Service, users gain a deeper understanding of their rights and responsibilities, as well as our commitment to maintaining a secure and fair experience for all.

We take security seriously at ConnectOn. We understand that your data is valuable and that it needs to be protected. That’s why we have implemented various measures to ensure the security of our Services Products.

Discover a security issue with our products or services? Please report it to us immediately so we can take swift action to resolve it.

Issues Reporting Guidelines

Thank you for working with ConnectOn to help ensure we can provide a timely response to security issues. ConnectOn supports responsible disclosure of security vulnerabilities, and we are committed to working with researchers to understand and resolve them fully.

To help ensure that we have enough information to evaluate a potential issue properly, ConnectOn asks that you include the following information in your report:

  • A description of the issue explaining the Security issues, including the impact to the user(s) or system. This should clearly describe how the issue crosses privilege boundaries.
  • The affected product, Resource, or Service ( e.g Managed Services or third-party products, ConnectOn product websites), the software version, and the platform you are using (e.g., Windows 11, Windows Servers, MAC OS, Linux).

If you are having a security incident, we can help take swift action.

The first steps you take after a security breach will have a major impact on your business.

Time is of the utmost essence, and the effectiveness of the next actions dictate not only how long it takes to get your business back up and running, but also the associated costs to you and your customers.

We offer a comprehensive solution for the planning and coordination of remediation efforts for systems, services, and data. Our team will work with you to develop a customized incident response plan that is tailored to your specific needs.

Our project management tools and techniques ensure that all aspects of the incident response process are efficiently managed, from initial assessment to final resolution.

With ConnectOn’s Incident Response Project Management, you can rest assured that your systems, services, and data are in good hands. Whether you’re dealing with a security breach, natural disaster, or other unexpected event, our team is standing by and ready.

At ConnectOn, we adhere to the highest standards of compliance. We are proudly SOC 2 Type 1 compliant and Under SOC 2 Type 2 Observation. We are actively going through our SOC 2 Type 2 audit.

Our commitment to these standards means that we implement strict controls to ensure the confidentiality, integrity, and availability of your data.

AICPA SOCA SOC 2 Type I report describes a service organization’s systems and whether the design of specified controls meets the relevant trust services categories at a point in time. ConnectOn, Inc. SOC 2 Type I report did not have any noted exceptions and was therefore issued a “clean” audit opinion”.

SOC 2 (System and Organization Controls 2) is a type of audit report that evaluates the effectiveness of a company’s information security policies and procedures. It focuses on five key trust service categories: security, availability, processing integrity, confidentiality, and privacy. Companies that obtain SOC 2 certification demonstrate their commitment to ensuring the security and privacy of their clients’ data.

These reports are intended to meet the needs of a broad range of users that need detailed information and assurance about the controls at a service organization relevant to security, availability, and processing integrity of the systems the service organization uses to process users’ data and the confidentiality and privacy of the information processed by these systems. These reports can play an important role in:

  • Oversight of the organization
  • Vendor management programs
  • Internal corporate governance and risk management processes
  • Regulatory oversight