Compliance
The Titan platform was designed and built with security as a top priority. From the physical infrastructure through to the application infrastructure and up to the user level management security is at the forefront of Titan’s design. Security safeguard have been designed to keep our customer data safe and secure. Titan is hosted on the AWS Cloud platform and is maintained with 99.999% uptime. We use a Linux-based virtual machine as well as various AWS services to offer high performance and availability. The AWS infrastructure puts strong safeguards in place to help protect customer privacy. All data is stored in highly secure AWS data centers.
GDPR Compliance
The General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679) is a regulation by which the European Parliament, the Council of the European Union and the European Commission intend to strengthen and unify data protection for all individuals within the European Union (EU). It also addresses the export of personal data outside the EU. Contact Us
The General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679) is a regulation by which the European Parliament, the Council of the European Union and the European Commission intend to strengthen and unify data protection for all individuals within the European Union (EU). It also addresses the export of personal data outside the EU. Contact Us
HIPAA Compliance
The Health Insurance Portability and Accountability Act (HIPAA) sets the standard for sensitive patient data protection. Companies that deal with protected health information (PHI) must have physical, network, and process security measures in place and follow them to ensure HIPAA Compliance. Contact Us
The Health Insurance Portability and Accountability Act (HIPAA) sets the standard for sensitive patient data protection. Companies that deal with protected health information (PHI) must have physical, network, and process security measures in place and follow them to ensure HIPAA Compliance. Contact Us
508 Compliance
Section 508 is aimed especially for people with disabilities, making sure that Federal departments and agencies develop, as well as use Information and Communication Technology that provide them with access. to information and data for people with disabilities. Currently all federal agencies and institutions that receive federal funding are required to be 508 Compliant. however, Many large companies have also voluntarily chosen to be 508 Compliant. Contact Us
Section 508 is aimed especially for people with disabilities, making sure that Federal departments and agencies develop, as well as use Information and Communication Technology that provide them with access. to information and data for people with disabilities. Currently all federal agencies and institutions that receive federal funding are required to be 508 Compliant. however, Many large companies have also voluntarily chosen to be 508 Compliant. Contact Us
ISO Compliance
The ISO/IEC 27000 family of standards helps organizations keep information assets secure, such as financial information, intellectual property, employee details or information entrusted to you by third parties. Contact Us
The ISO/IEC 27000 family of standards helps organizations keep information assets secure, such as financial information, intellectual property, employee details or information entrusted to you by third parties. Contact Us
PCI SSI Compliance
The PCI SSC is a regulatory body formed by and comprised of the world’s five biggest card payment providers; Visa, American Express, Discover Financial Services, JCB and MasterCard. Their goal is protecting customer card data and reducing the potential for fraud and/or data breaches. If you intend on taking card payments for goods or services via any of the 5 members mentioned, you will be required to meet one of four levels of compliance as part of your PCI DSS assessment. Contact Us
The PCI SSC is a regulatory body formed by and comprised of the world’s five biggest card payment providers; Visa, American Express, Discover Financial Services, JCB and MasterCard. Their goal is protecting customer card data and reducing the potential for fraud and/or data breaches. If you intend on taking card payments for goods or services via any of the 5 members mentioned, you will be required to meet one of four levels of compliance as part of your PCI DSS assessment. Contact Us
CCPA Compliance
Since January 1st, 2020, the California Consumer Privacy Act (“CCPA”) governs how businesses handle the personal information of California residents. At Titan, we are committed to ensuring the success of our customers, including their compliance efforts with respect to the CCPA. We’re here to assist our subscribers with their efforts to comply with the CCPA. Contact Us
Since January 1st, 2020, the California Consumer Privacy Act (“CCPA”) governs how businesses handle the personal information of California residents. At Titan, we are committed to ensuring the success of our customers, including their compliance efforts with respect to the CCPA. We’re here to assist our subscribers with their efforts to comply with the CCPA. Contact Us
SOC 2 is a voluntary compliance standard for service organizations, developed by the American Institute of CPAs (AICPA), which specifies how organizations should manage customer data. The standard is based on the following Trust Services Criteria: security, availability, processing integrity, confidentiality, privacy. A SOC 2 report is tailored to the unique needs of each organization. Depending on its specific business practices, each organization can design controls that follow one or more principles of trust. These internal reports provide organizations and their regulators, business partners, and suppliers, with important information about how the organization manages its data.
SOC 2 is a voluntary compliance standard for service organizations, developed by the American Institute of CPAs (AICPA), which specifies how organizations should manage customer data. The standard is based on the following Trust Services Criteria: security, availability, processing integrity, confidentiality, privacy. A SOC 2 report is tailored to the unique needs of each organization. Depending on its specific business practices, each organization can design controls that follow one or more principles of trust. These internal reports provide organizations and their regulators, business partners, and suppliers, with important information about how the organization manages its data.