The security of our products and services is a critical focus area for our organization. We utilize formal information security management practices based on globally accepted frameworks, regularly assess risks and periodically review our policies, procedures, and practices.
Aptitude Software utilizes secure by design principles in the development of its products and services including secure coding practices, periodic internal and external vulnerability scanning and penetration testing of our products. For further questions regarding our product security practices, please contact us at email@example.com
Aptitude Software creates and implements security policies based on industry best practices as well as international standards and regularly conducts internal audits, external attestations and third-party assessments for its products.
Aptitude Software engages AICPA accredited auditing firms to perform independent audits and to assess the effectiveness of controls in place for its cloud-based services. Below is a listing of current services covered by these attestations:
(1.) Aptitude RevStream (AREV): Currently covered by a SOC1 Type II report issued every 6 months, with an audit period of 12 months.
Existing clients (service users) can request this SOC report by contacting us at firstname.lastname@example.org
(2.) Aptitude Lease Accounting Engine (ALAE): Currently covered by a SOC1 Type II report issued every 6 months, with an audit period of 12 months*
Existing ALAE clients (service users) can request this SOC report by contacting us at email@example.com
*2019 is the first year of operation for the ALAE service so the period covered will be less than 12 months
(3.) Security and Availability for Aptitude Cloud Services: Currently covered by a SOC2 report
The report can be requested by current and prospective ALAE clients by contacting us at firstname.lastname@example.org
Aptitude Software is compliant with domestic and international standards and privacy laws. We utilize privacy by design principles in the design of our products and services. The Aptitude Software Data Protection Office (DPO) is responsible for privacy management at Aptitude Software. Our privacy statement is available at this link. For further questions please contact us at email@example.com
Aptitude Software utilizes formal incident response polices and procedures in the event of a security incident. Our process includes steps for incident identification, prioritization, threat monitoring, triage and incident resolution.
Existing clients can report security incidents to Aptitude Software at firstname.lastname@example.org