Compliance at Split

Split is committed to achieving and maintaining the trust of our customers.
Integral to this mission is providing a robust compliance program
that ensures the confidentiality of your data.


Split’s Service Organization Control (SOC) Reports are certified by a third party and demonstrate how Split maintains key compliance controls and objectives. Split has obtained SOC 2 Type 2.

Our Service Providers

Split holds its service providers, and specifically its data sub-processors, to similarly high standards. Data centers and managed service providers undergo regular third-party audits to verify their practices.

Split performs risk-based evaluations of the security measures of our vendors through its vendor management program. We review these security measures before we begin using a vendor. We re-evaluate vendor security measures on a recurring basis thereafter.

Review our list of data subprocessors

Validating Compliance

Third-party Audits

Split used independent third-parties to audit their security practices. These reviews occur at least annually and are conducted by a globally-respected audit and security firm. Any issues identified in these reports are processed by Split’s security team and addressed as necessary.

Continuous Testing

Split regularly performs vulnerability scans and third-party penetration tests on the Split network. We review and address findings from these activities to help maintain the security of our network.

Frequently Asked Questions

Is your data encrypted? Do you have a backup plan? How are passwords stored? 
Find answers to our top questions.