Previous
OverviewNext
PrivacyMeeting the highest standards of regulatory compliance.
We maintain a comprehensive compliance program that enables organizations across industries and geographies to use collab.space with confidence. Our certifications and alignments are independently verified.
| Certification | Status | Description |
|---|---|---|
| SOC 2 | In Progress | Working toward independent security audit certification |
| ISO 27001 | In Progress | Working toward independent security audit certification |
| GDPR | Compliant | European data protection regulation compliance |
| Regulation | Status | Details |
|---|---|---|
| GDPR | Compliant | Full compliance with General Data Protection Regulation |
| EU-US DPF | Certified | Data Privacy Framework for EU-US transfers |
| SCCs | Implemented | Standard Contractual Clauses in all DPAs |
| Data Residency | Available | EU data center option for EU customers |
| Framework | Status | Details |
|---|---|---|
| CCPA | Compliant | California Consumer Privacy Act compliance |
| Regulation | Status | Details |
|---|---|---|
| UK GDPR | Compliant | Post-Brexit data protection compliance |
| Regulation | Status | Details |
|---|---|---|
| Privacy Act 1988 | Compliant | Australian Privacy Principles compliance |
| APP | Aligned | All 13 Australian Privacy Principles addressed |
| Notifiable Data Breaches | Compliant | NDB scheme compliance |
| Regulation | Status | Details |
|---|---|---|
| PIPEDA | Compliant | Federal private sector privacy law |
| Control Domain | Controls | Status |
|---|---|---|
| Access Control | 12 controls | All implemented |
| Asset Management | 8 controls | All implemented |
| Business Continuity | 6 controls | All implemented |
| Communications Security | 10 controls | All implemented |
| Cryptography | 5 controls | All implemented |
| Human Resources | 7 controls | All implemented |
| Incident Management | 8 controls | All implemented |
| Operations Security | 14 controls | All implemented |
| Physical Security | 6 controls | All implemented |
| Supplier Relations | 5 controls | All implemented |
| System Development | 11 controls | All implemented |
| Report | Availability | How to Request |
|---|---|---|
| SOC 2 Type II | In Progress | Contact via website for timeline |
| Privacy Impact Assessment | On Request | Contact via website. |
| Document | Description |
|---|---|
| Data Processing Agreement | Standard DPA for customers |
| Sub-processor List | Current list of sub-processors |
| Security Whitepaper | Detailed security architecture |
| Privacy Policy | How we handle personal data |
| Terms of Service | Service agreement terms |
| Industry | Compliance Support |
|---|---|
| Financial Services | Encryption standards, comprehensive audit logs |
| Government | Data residency options available |
| Legal | Comprehensive audit logs, data export capabilities |
We regularly complete security questionnaires for enterprise customers:
| Questionnaire | Status |
|---|---|
| SIG Lite | Available upon request |
| SIG Core | Available upon request |
| CAIQ | Available upon request |
| Custom | Available upon request |
Contact our team via the website.
| Contact | Details |
|---|---|
| Compliance Team | [email protected] |
| Privacy Team | [email protected] |
| DPO | [email protected] |