Skip to main content

How does Vetster protect information from unauthorized access and data breaches?

Updated over a week ago


​

Vetster uses a layered security program that combines policies, trained people, and technical controls to keep data safe. Access to records is limited to authorized users with a job-related need, consistent with Vetster policies and applicable laws.

About SOC 2:
​
Vetster maintains a SOC 2 security program. SOC 2 (Service Organization Control 2) is an independent audit framework developed by the AICPA that evaluates how a company safeguards data across the Trust Services Criteria, including security, availability, processing integrity, confidentiality, and privacy.

Key safeguards include:

  • Encryption in transit and at rest

  • Role-based access control, least-privilege permissions, and multi-factor authentication

  • Continuous logging and monitoring, vulnerability management, and regular third-party testing

  • Secure software development practices and change control

  • Employee security training and vetted vendor management

  • Regular backups and documented incident response and disaster recovery procedures
    ​
    ​

A summary of our security practices and SOC 2 posture can be provided on request.

Did this answer your question?