Interaction logo
Live monitoring by Delve
Interaction Compliance Report
Interaction is in compliance with security best practices, has implemented and is monitoring comprehensive controls, and maintains policies to outline its security procedures.
Ctrl+K

Compliance Certifications

We maintain the highest industry standards and regularly undergo rigorous third-party audits to ensure compliance.

SOC 2 Type IICompliant

SOC 2 Type II

Audited controls for security, availability, and confidentiality trust service principles with an observation period.

Last audit: January 2025

Resource Library

Access our security documentation, policies, and compliance reports.

PDF

SOC 2 Type II

Compliance report

PDF

HIPAA Internal Privacy Policy

HIPAA Internal Privacy Policy document

Updated: November 2025
PDF

Age Verification and Parental Consent Policy

Age Verification and Parental Consent Policy document

Updated: November 2025
PDF

Personnel Security Policy

Personnel Security Policy document

Updated: November 2025
PDF

Acceptable Use Policy

Acceptable Use Policy document

Updated: November 2025
PDF

Data Protection, Accountability, and Privacy by Design Policy

Data Protection, Accountability, and Privacy by Design Policy document

Updated: November 2025

Security controls

Our comprehensive security program includes controls across multiple domains to protect your data.

Access Control & Authorization

LIVE
Access Control Procedures
Completed
Access Review of Infrastructure
Completed
Employee Handbook
Completed

Compliance with Regulations & Standards

LIVE
Age Verification and Parental/​guardian Consent Process
Completed
Anonymization/​pseudonymization Process Documentation
Completed
Appointment Agreement for EU Representative
Completed

Data Protection & Privacy

LIVE
Access Control Procedures
Completed
Access Restricted to Modify Infrastructure
Completed
Anonymization/​pseudonymization Process Documentation
Completed

Governance & Oversight

LIVE
Anonymization/​pseudonymization Process Documentation
Completed
Background Checks
Completed
Cooperation Agreements/​data Sharing Frameworks
Completed

IT & Operational Security

LIVE
Alerts and Remediation
Completed
Application Outages
Completed
Asset Register List
Completed

Risk & Compliance Management

LIVE
Access Control Procedures
Completed
Board Charter
Completed
Board Meeting Minutes
Completed

Access Control & Authorization

LIVE
Access Control Procedures
Completed
Access Review of Infrastructure
Completed
Employee Handbook
Completed
Environmental Security Control
Completed

Compliance with Regulations & Standards

LIVE
Age Verification and Parental/​guardian Consent Process
Completed
Anonymization/​pseudonymization Process Documentation
Completed
Appointment Agreement for EU Representative
Completed

Data Protection & Privacy

LIVE
Access Control Procedures
Completed
Access Restricted to Modify Infrastructure
Completed
Anonymization/​pseudonymization Process Documentation
Completed
Asset Register List
Completed

Governance & Oversight

LIVE
Anonymization/​pseudonymization Process Documentation
Completed
Background Checks
Completed
Cooperation Agreements/​data Sharing Frameworks
Completed
Criminal Data Processing Policy
Completed

IT & Operational Security

LIVE
Alerts and Remediation
Completed
Application Outages
Completed
Asset Register List
Completed
Asset Register Maintaining
Completed

Risk & Compliance Management

LIVE
Access Control Procedures
Completed
Board Charter
Completed
Board Meeting Minutes
Completed
Chief Information Security Officer Appointment
Completed

Access Control & Authorization

LIVE
Access Control Procedures
Completed
Access Review of Infrastructure
Completed
Employee Handbook
Completed
Environmental Security Control
Completed

Compliance with Regulations & Standards

LIVE
Age Verification and Parental/​guardian Consent Process
Completed
Anonymization/​pseudonymization Process Documentation
Completed
Appointment Agreement for EU Representative
Completed

Data Protection & Privacy

LIVE
Access Control Procedures
Completed
Access Restricted to Modify Infrastructure
Completed
Anonymization/​pseudonymization Process Documentation
Completed
Asset Register List
Completed

Governance & Oversight

LIVE
Anonymization/​pseudonymization Process Documentation
Completed
Background Checks
Completed
Cooperation Agreements/​data Sharing Frameworks
Completed
Criminal Data Processing Policy
Completed

IT & Operational Security

LIVE
Alerts and Remediation
Completed
Application Outages
Completed
Asset Register List
Completed
Asset Register Maintaining
Completed

Risk & Compliance Management

LIVE
Access Control Procedures
Completed
Board Charter
Completed
Board Meeting Minutes
Completed
Chief Information Security Officer Appointment
Completed
Showing 6 of 7 control categories

Frequently Asked Questions

Find answers to common questions about our security and compliance practices.

Our Security Commitment

Security Shield

At Interaction, security isn't just a feature—it's foundational to everything we build. Our security-first mindset drives our development processes, infrastructure decisions, and organizational policies. We treat the data entrusted to us—whether from our customers, their end users, or anyone who interacts with our organization—with the utmost care and responsibility. Security is embedded in our DNA, enabling us to deliver innovative solutions without compromising on protection.

Monitored byDelve Logo
Security Shield