IT Compliance

For most companies, adherence to any number of regulations and industry standards is a requirement for doing business in a global market. It also can be time consuming, and doesn’t come cheap. That’s why it’s good to have Peak 10 in your corner. We have a dedicated IT compliance officer on staff. Plus, you can leverage our audit-ready facilities and compliant cloud infrastructure to ensure the security and availability of your applications and data —and help meet your company’s IT compliance requirements.

When it comes to security and technical controls, the proof is in the certification. Peak 10 has successfully completed the following:

SSAE 16/ISAE SOC 1 Type 2

SSAE 16/ISAE
SOC 1 Type 2

This dual-standard report is intended to help Peak 10 customers and their auditors in evaluating the effect of the controls at Peak 10 on their financial statement assertions. The SOC 1 report attests that Peak 10’s control objectives are appropriately designed and operating effectively.

ISO 27001 Logo

ISO 27001

Peak 10 is certified under ISO/IEC 27001:2013, which is an auditable international standard that formally outlines requirements for an Information Security Management System (ISMS) to help protect and secure an organization’s data.

SOC 2 Type 2

SOC 2 Type 2

The SOC 2 report is an attestation report that provides an evaluation of controls specific to the criteria set forth by the American Institute of Certified Public Accountants (AICPA) Trust Services Principles. These principles define leading practice controls relevant to security, and availability.

SOC 3 Type 2

SOC 3 Type 2

The SOC 3 report is a Trust Services Report, and is designed to meet the needs of Peak 10 customers that want assurance about Peak 10’s controls related to security and availability but do not need the level of detail provided in a SOC 2 Report.

Level 1 Service Provider under PCI DSS

Level 1 Service Provider under PCI DSS

Peak 10 is certified under PCI DSS as a Level 1 service provider. This means that Peak 10 data centers, cloud infrastructure operations are PCI DSS compliant.

HIPAA / HITECH Security Rule Compliance Report (AT 101)

HIPAA / HITECH Security Rule Compliance Report (AT 101)

Peak 10 data centers and cloud infrastructure meet the stringent requirements for IT compliance with the Health Insurance Portability and Accountability Act (HIPAA) Security Rule. We have implemented the physical, technical, and administrative safeguards to ensure that confidential electronic protected health information (ePHI) is secure.

U.S. Department of Commerce Safe Harbor Program

U.S. Department of Commerce Safe Harbor Program

Peak 10 is certified under the U.S. Department of Commerce Safe Harbor Program, known as the U.S.-EU Safe Harbor Framework “Safe Harbor”.

Certification reports and other documentation is available to Peak 10 customers through our web-based customer portal.

In addition, Peak 10 holds the following:

  • Cisco Cloud Provider Certification with a Cisco Powered Cloud Infrastructure-as-a- Service (IaaS) designation
  • Cisco Powered Disaster Recovery as a Service (DRaaS) designation under the Cisco® Cloud and Managed Services Advanced Certification

Looking for audit documentation? If you’re a Peak 10 customer, head to the Customer Portal where you can access the following information:

 

Or, contact your Customer Success Manager or Account Manager for assistance.

Don’t go it alone. Peak 10 can provide support for customer audits, and is audit-ready if you need assistance in meeting any number of regulatory demands or the requirements of many certifications, including:

  • Statement on Standards for Attestation En­gagements (SSAE 16)
  • Health Insurance Portability and Account­ability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)
  • Payment Card Industry Data Security Stan­dard (PCI DSS)
  • Sarbanes-Oxley (SOX)
  • Food and Drug Administration (FDA)
  • U.S.-EU Safe Harbor (European Commission’s Directive on Data Protection)
  • ISO/IEC 27001:2013
  • Gramm-Leach-Bliley (GLBA)
  • International Traffic in Arms Regulations (ITAR)
  • Federal Information Security Management Act (FISMA)

We can work with you in responding to your auditors by providing access to our audit reports or having our Peak 10 IT compliance officer meet with your auditor. In addition, we can help with management representation letters and regulatory questionnaires.

To learn more about how Peak 10’s compliance program and on-staff compliance officer can benefit your organization, contact us now.

Ready to get started? Just want to learn more?

 
We Make Compliance Easy

We Make Compliance Easy

Adherence to regulations and industry standards is a requirement for global business, which can be time consuming. Leverage our infrastructure to ensure security and availability as well as our library of certifications including PCI DSS and HIPAA compliance. Contact us to learn more.

Required

You have Successfully Subscribed!