Security & Compliance

At Acorn, we prioritize the security and privacy of your data. Our comprehensive security program ensures your information is protected at every level.

Learn More

Our Security Practices

🔒

Data Encryption

All data is encrypted both in transit and at rest using industry-standard encryption protocols.

🛡️

Regular Security Audits

We conduct regular security audits and penetration testing to identify and address potential vulnerabilities.

🔑

Access Controls

Robust access controls ensure that only authorized personnel can access sensitive data and systems.

📋

Compliance

We maintain compliance with relevant industry standards and regulations to ensure data protection.

Infrastructure Security

Our infrastructure is hosted on industry-leading cloud providers with robust security measures in place.

  • Redundant systems across multiple geographic regions
  • 24/7 monitoring and alerting systems
  • DDoS protection and mitigation
  • Regular security patches and updates

Our dedicated security team works around the clock to monitor and protect our systems from potential threats.

Infrastructure Security

Compliance & Certifications

SOC 2 Type II certification

SOC 2 Type II

Service Organization Control 2 Type II compliance for security, availability, and confidentiality.

GDPR certification

GDPR

Compliant with the European Union's General Data Protection Regulation.

ISO 27001 certification

ISO 27001

International standard for information security management systems.

HIPAA certification

HIPAA

Compliant with the Health Insurance Portability and Accountability Act for healthcare data.

Data Privacy

We are committed to protecting your privacy and ensuring that your data is handled responsibly. Our comprehensive data privacy program includes:

Data Minimization

We collect only the data necessary to provide our services, and we regularly review and remove unnecessary data.

Transparency

Our privacy policy clearly explains what data we collect, how we use it, and your rights regarding your data.

User Control

We provide tools for users to access, export, and delete their data in accordance with applicable privacy laws.

Third-Party Risk Management

We carefully vet all third-party vendors and ensure they meet our strict security and privacy requirements.

Security Contact

If you have any security concerns or would like to report a vulnerability, please contact our security team.

Contact Security Team