Compliance at Split

Split is committed to achieving and maintaining the trust of our customers.
Integral to this mission is providing a robust compliance program
that ensures the confidentiality of your data.

SOC2 Logo

SOC2

Split’s Service Organization Control (SOC) Reports are certified by a third party and demonstrate how Split maintains key compliance controls and objectives. Split has obtained SOC2 Type 1.

Our Service Providers

Split holds its service providers, and specifically its data sub-processors, to similarly high standards. Data centers and managed service providers undergo regular third-party audits to verify their practices.

Split performs risk-based evaluations of the security measures of our vendors through its vendor management program. We review these security measures before we begin using a vendor. We re-evaluate vendor security measures on a recurring basis thereafter.

Review our list of data subprocessors

Validating Compliance

Third-party Audits

Split used independent third-parties to audit their security practices. These reviews occur at least annually and are conducted by a globally-respected audit and security firm. Any issues identified in these reports are processed by Split’s security team and addressed as necessary.

Continuous Testing

Split regularly performs vulnerability scans and third-party penetration tests on the Split network. We review and address findings from these activities to help maintain the security of our network.

Frequently Asked Questions

Can we see the testing reports? Can you complete my security questionnaire?
Find answers to our top questions.