SOC 2 Type II
In progressAudit window underway. We can share our current control framework, monitoring posture, and progress under NDA during a procurement review.
NorthernPlus is built so that staying compliant is the path of least resistance, not a separate workstream. Below is an honest snapshot of where we are, where we're heading, and how we handle data for your firm and its clients.
We don't oversell what we have. Here's the current state, item by item.
Audit window underway. We can share our current control framework, monitoring posture, and progress under NDA during a procurement review.
Encryption, access controls, audit logging, and data segregation align with HIPAA Security Rule requirements. BAA execution available on the Advanced tier; full BAA-eligible posture across all subprocessors on roadmap.
TLS 1.3 across every surface: client intake, admin console, voice agent, and integrations. No exceptions.
AES-256 at rest across application database, file storage, and backups. Field-level encryption for sensitive intake data on roadmap.
Two-click client redaction for GDPR and CCPA requests. PII is scrubbed in place; matter audit trails are preserved for bar-association recordkeeping.
Independent third-party penetration test scheduled before general availability. Report available to enterprise customers under NDA on completion.
If you discover a vulnerability, please report it directly to security@northernplus.com. We acknowledge reports within one business day, triage within three, and disclose responsibly with credit to the reporter when desired.
We do not pursue legal action against good-faith security research conducted under standard responsible-disclosure norms.
We respond to security and procurement questionnaires within five business days. Bring yours to your demo or send it ahead.