Compliance
at Monit Data

The safety and continuity of your business is Monit Data’s top priority. Our services meet industry compliance standards and regulatory requirements. Regular third-party audits and certifications give you the trust and compliance you need.

Outsource your data with confidence

As an organization you want to serve your customers best by focussing on providing your core services. And outsource any other supporting services to specialized external suppliers. With outsourcing much of your sensitive data is usually moved to the cloud. Therefore you need to know if your data and business continuity is safe.

Monit Data’s compliance program ensures that we meet the standards to process your sensitive data. Our services are subject to regular third-party audits. We test our security, infrastructure, processes, controls and suppliers. The results are shown in successful audit reports and certifications according to the various industry standards.

Our goal is to meet all compliance requirements you want in a supplier.

Our compliance measures

ISO 27001

ISO 27001 is an international standard on managing information security. It details requirements for implementing, maintaining and improving an Information Security Management System (ISMS). The goal is to ensure the integrity, confidentiality and availability of information within Monit Data.

ISAE 3402 Type I

A Type 1 Service Organization Control (SOC) describes services and functions performed by an organization and the controls in place. The audit evaluates if the controls are effective and meet standards. This provides assurances on the integrity of (financial) data handling and reporting.

ISAE 3402 Type II

In addition to the snapshot of Type I, an ISAE 3402 Type II involves an audit over a longer period. Over a period of at least 6 months, it will be assessed whether the controls have been effective to achieve the standards. An organisation with a Type II certification therefore has an even higher integrity of its service levels.

Monit Data compliance pen test

Pen test

A pen (penetration) test checks the security of a computer system. ‘Ethical hackers’ attempt to breach systems with a simulated cyberattack. The results can be used to identify and patch vulnerabilities and adapt security policies. Monit Data uses independent external parties to perform a pen test.