Solutions
white polygon to topa blue puzzle piece on a white background
Custom Solutions
arrow right
SMB Finance
arrow right
Equipment Finance
arrow right
Transform Insurance Operations
Insurance
arrow right
Legal
arrow right
Product
white polygon to topstars icon
Capabilities
arrow right
document icon
Documents Supported
arrow right
a blue icon of two connected dots
Integrations
arrow right
a blue shield with a check mark on it
Security
arrow right
a blue bird logo with a white background
Getting Started
arrow right
file search icon
Automatic File Renaming
arrow right
Company
white polygon to topa blue arrow pointing to the left
About
arrow right
a blue briefcase sitting on top of a white floor
Careers
arrow right
a blue square with a white border
Blog
arrow right
case studies icon
Case Studies
arrow right
Developers
white polygon to topa blue button with a white button on it
API Tutorial
arrow right
a blue icon with a white arrow
API Reference Docs
arrow right
speedometer icon
Heron Status Page
arrow right
a blue puzzle piece on a white background
JSON Schema Tools
arrow right
Company
white polygon to topstars icon
Capabilities
arrow right
document icon
Documents Supported
arrow right
a blue icon of two connected dots
Integrations
arrow right
a blue shield with a check mark on it
Security
arrow right
a blue bird logo with a white background
Getting Started
arrow right
Customer Login
Book a demo
arrow right

Security Information

Overview and Security Statement

Data Security and our customers’ privacy is a key component of Heron Data’s business model. Heron Data devotes significant resources to ensure that we meet all facets of multiple industry and regulatory best-practices for protecting the Confidentiality, Processing Integrity, Availability, and Privacy of customer data. The following is an overview of Heron Data’s security posture and key controls. If you have any questions please feel free to reach out to us at security@herondata.io and we’ll get back to you ASAP!

Change Management

Heron Data’s software development practices are aligned with industry best practices and follows a defined software development life cycle methodology. This development process introduces security and privacy control specifications during the feature and component design and throughout the development process.

Strong Encryption

Heron Data has deployed secure methods and protocols for transmission of confidential or sensitive information over public networks. Databases housing sensitive customer data are encrypted at rest. Heron Data uses only recommended secure cipher suites and protocols to encrypt all traffic in transit and Customer Data is securely encrypted with strong ciphers and configurations when at rest.

Access Controls

Heron Data uses secure access protocols and processes and follows industry best-practices for authentication, including Multifactor Authentication and Single Sign on (SSO). All production access requires the use of two-factor authentication, and network infrastructure is securely configured to vendor and industry best practices to block all unnecessary ports, services, and unauthorized network traffic.

Vulnerability Management

Heron Data performs automated continuous vulnerability scanning of our environment and contracts with reputable external security firms such as Vanta to perform technical testing against our critical systems. We also employ a suite of tools and processes to perform continuous auditing and monitoring of our infrastructure for suspected malicious activities, unpatched systems, misconfigurations, and other potential vulnerabilities.

Additionally:

  • Heron Data performs a periodic Enterprise Risk Assessment to identify and prioritize current and emerging threats.
  • Heron Data enforces host-based protections on all of our infrastructure and user endpoints, such as disk encryption, locking screensavers, and use of antimalware controls.

Awareness and Background Checks

Heron Data conducts background checks on all employees before onboarding, and employees receive comprehensive security awareness and privacy training at hire and on an ongoing basis. All employees are required to read and acknowledge our information security policies, which include specific provisions for the protection of customer data.

Culture and Code of Conduct

Heron Data has developed a code of conduct that addresses acceptable business practices, conflicts of interest, and expected standards of ethical and moral behavior, as well as employee confidentiality agreements that prohibit the inappropriate use and disclosure of customer or company information. These documents are provided to all new employees and are required to be signed prior to the employee’s start date. All employees are also required to sign an acknowledgement form that they received and agree to follow the code of conduct and confidentiality agreement.

External Audits

Heron Data is SOC 2 Type 1 certified, and is undergoing a SOC 2 Type 2 & Type 3 audit that includes the Security and Processing Integrity Trust Service Criteria. For more details, please contact security@www.herondata.io

Privacy

Heron Data has clearly defined how we collect, use and disclose customer information and the choices customers have about their information in the Heron Data Privacy Policy. Heron Data maintains detailed inventory of all information systems and the data that resides in each asset. Data is classified based on the nature of information and treated as such. Additionally, customer data is deleted upon request from the customer or following a service termination.

You can find additional information on Heron Data’s Privacy and Cookie Policies here.

Incident Response

In the event of a security breach Heron Data will promptly notify impacted users of any actual or suspected unauthorized access to their systems and data. Heron Data has developed detailed response policies and associated procedures and a team is in place to respond to events and incidents.

a blue bird

Ready to Get Started?

Join 130+ Small Business Financing Companies, Fintechs, Insurers, and more to streamline your application intake, underwriting, and compliance workflows

Book a demo
arrow right
a blue wall with a clock on it
heron logo
Open Credit Technologies, Inc.

169 Madison Ave STE 2195

New York, NY 10016
Call us (929) 277-2824
Solutions
SMB Finance
Equipment Finance
Insurance
Legal
Product
CapabilitiesDocuments SupportedIntegrationsSecurityGetting StartedAutomatic File Renaming
Company
AboutCareersBlogCase Studies
Developers
API TutorialAPI Reference DocsHeron Status Page
Legal
Privacy PolicyCookies PolicySubprocessorsTerms of ServiceResponsible Disclosure PolicySecurity Information
heron logo
©2024. Open Credit Technologies Inc. All Rights Reserved
All systems operational