Security & Trust Framework
Compliance & Standards
6 min
overview momentscience is committed to protecting customer data and maintaining the highest standards of security, privacy, and reliability our fully managed platform is designed to help you engage customers confidently, knowing that data and workflows are safeguarded by industry best practices we are proud to be soc 2 compliant , a milestone that demonstrates our rigorous approach to data protection, operational reliability, and customer trust soc 2 compliance validates that we secure sensitive information, maintain platform availability, and safeguard confidentiality through independently audited controls from a technical perspective, soc 2 compliance means that our systems and processes have been independently assessed against the aicpa trust services criteria for security protection against unauthorized access availability reliable access to the platform when you need it confidentiality safeguarding sensitive data throughout its lifecycle this certification reinforces our ongoing commitment to continuous improvement in security and compliance compliances momentscience meets recognized industry standards soc 2 (type ii) independently audited against the aicpa trust services criteria for security, availability, and confidentiality privacy compliance adheres to gdpr and ccpa principles, including data minimization, user consent, and transparent data handling for the latest compliance details, visit our trust center controls we implement multiple layers of controls across product, data, network, application, endpoint, and corporate domains these controls are continuously monitored and tested to ensure effectiveness examples of controls product security situational awareness for incidents data security testing for reliability and integrity network security transmission confidentiality monitoring anomalous behavior centralized collection of security event logs application security conspicuous link to privacy notice formal approval of changes endpoint security malicious code protection (anti malware) device or container based encryption endpoint encryption corporate security code of business conduct defined organizational structure clear roles and responsibilities a full list of controls is available in the trust center resources supporting documentation and policies provide transparency and guidance for compliance practices policies (33) , including code of business conduct compliance policy encryption policy documents (1) code of business conduct policy additional resources can be accessed in the trust center for compliance related inquiries, please contact help\@momentscience com mailto\ help\@momentscience com