Compliance

The Titan platform was designed and built with security as a top priority. From the physical infrastructure through to the application infrastructure and up to the user level management security is at the forefront of Titan’s design. Security safeguard have been designed to keep our customer data safe and secure. Titan is hosted on the AWS Cloud platform and is maintained with 99.999% uptime. We use a Linux-based virtual machine as well as various AWS services to offer high performance and availability. The AWS infrastructure puts strong safeguards in place to help protect customer privacy. All data is stored in highly secure AWS data centers.

GDPR Compliance

The General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679) is a regulation by which the European Parliament, the Council of the European Union and the European Commission intend to strengthen and unify data protection for all individuals within the European Union (EU). It also addresses the export of personal data outside the EU. Contact Us

The General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679) is a regulation by which the European Parliament, the Council of the European Union and the European Commission intend to strengthen and unify data protection for all individuals within the European Union (EU). It also addresses the export of personal data outside the EU. Contact Us

ISO Compliance

The ISO/IEC 27000 family of standards helps organizations keep information assets secure, such as financial information, intellectual property, employee details or information entrusted to you by third parties. Contact Us

The ISO/IEC 27000 family of standards helps organizations keep information assets secure, such as financial information, intellectual property, employee details or information entrusted to you by third parties. Contact Us

508 Compliance

Section 508 is aimed especially for people with disabilities, making sure that Federal departments and agencies develop, as well as use Information and Communication Technology that provide them with access. to information and data for people with disabilities. Currently all federal agencies and institutions that receive federal funding are required to be 508 Compliant. however, Many large companies have also voluntarily chosen to be 508 Compliant. Contact Us

Section 508 is aimed especially for people with disabilities, making sure that Federal departments and agencies develop, as well as use Information and Communication Technology that provide them with access. to information and data for people with disabilities. Currently all federal agencies and institutions that receive federal funding are required to be 508 Compliant. however, Many large companies have also voluntarily chosen to be 508 Compliant. Contact Us

HIPAA Compliance

The Health Insurance Portability and Accountability Act (HIPAA) sets the standard for sensitive patient data protection. Companies that deal with protected health information (PHI) must have physical, network, and process security measures in place and follow them to ensure HIPAA Compliance. Contact Us

The Health Insurance Portability and Accountability Act (HIPAA) sets the standard for sensitive patient data protection. Companies that deal with protected health information (PHI) must have physical, network, and process security measures in place and follow them to ensure HIPAA Compliance. Contact Us

PCI SSI Compliance

The PCI SSC is a regulatory body formed by and comprised of the world’s five biggest card payment providers; Visa, American Express, Discover Financial Services, JCB and MasterCard. Their goal is protecting customer card data and reducing the potential for fraud and/or data breaches. If you intend on taking card payments for goods or services via any of the 5 members mentioned, you will be required to meet one of four levels of compliance as part of your PCI DSS assessment. Contact Us

The PCI SSC is a regulatory body formed by and comprised of the world’s five biggest card payment providers; Visa, American Express, Discover Financial Services, JCB and MasterCard. Their goal is protecting customer card data and reducing the potential for fraud and/or data breaches. If you intend on taking card payments for goods or services via any of the 5 members mentioned, you will be required to meet one of four levels of compliance as part of your PCI DSS assessment. Contact Us

CCPA Compliance

Since January 1st, 2020, the California Consumer Privacy Act (“CCPA”) governs how businesses handle the personal information of California residents. At Titan, we are committed to ensuring the success of our customers, including their compliance efforts with respect to the CCPA. We’re here to assist our subscribers with their efforts to comply with the CCPA. Contact Us

Since January 1st, 2020, the California Consumer Privacy Act (“CCPA”) governs how businesses handle the personal information of California residents. At Titan, we are committed to ensuring the success of our customers, including their compliance efforts with respect to the CCPA. We’re here to assist our subscribers with their efforts to comply with the CCPA. Contact Us

SOC2 Compliance

SOC 2 is a voluntary compliance standard for service organizations, developed by the American Institute of CPAs (AICPA), which specifies how organizations should manage customer data. The standard is based on the following Trust Services Criteria: security, availability, processing integrity, confidentiality, privacy. A SOC 2 report is tailored to the unique needs of each organization. Depending on its specific business practices, each organization can design controls that follow one or more principles of trust. These internal reports provide organizations and their regulators, business partners, and suppliers, with important information about how the organization manages its data.

SOC 2 is a voluntary compliance standard for service organizations, developed by the American Institute of CPAs (AICPA), which specifies how organizations should manage customer data. The standard is based on the following Trust Services Criteria: security, availability, processing integrity, confidentiality, privacy. A SOC 2 report is tailored to the unique needs of each organization. Depending on its specific business practices, each organization can design controls that follow one or more principles of trust. These internal reports provide organizations and their regulators, business partners, and suppliers, with important information about how the organization manages its data.

PIPEDA Compliance

PIPEDA stands for Personal Information Protection and Electronic Documents Act. It is Canada’s federal law on personal data protection. Since its enactment in April 2000, PIPEDA has been amended multiple times to make the comprehensive online privacy law aligned with most of the current privacy legislation trends that is now.

PIPEDA stands for Personal Information Protection and Electronic Documents Act. It is Canada’s federal law on personal data protection. Since its enactment in April 2000, PIPEDA has been amended multiple times to make the comprehensive online privacy law aligned with most of the current privacy legislation trends that is now.