WelcomeHome successfully meets systems compliance for security and data protection.
Collecting sensitive data is integral to the senior living industry, and its storage is critical. Communities gather financial, health, and personal information on prospective residents while tracking their confidential occupancy and move-in rates to measure performance goals.
Data travels quickly between individuals, sales teams, and software management companies as leads are captured, qualified, and converted – and business figures are classified and analyzed. But how is this information being protected?
In today’s complicated world, the answer is simple: SOC 2. System and Organization Controls (SOC 2) report provides detailed insight into a company’s controls relevant to security, availability, integrity, confidentiality, and privacy.
WelcomeHome is leading the senior living industry in implementing data security controls by achieving SOC 2 compliance. Considered the gold standard in measuring data security and privacy, a SOC 2 audit by a third-party accounting firm reviews and tests a service company’s systems to assess whether they are operating within the standards created by the American Institute of Certified Public Accountants (AICPA).
In completing the audit, the following are a few benchmarks required to demonstrate proficiently:
How WelcomeHome collects and tracks information, including what data is downloaded and when
How data is protected from unauthorized use
How WelcomeHome tracks changes in authorization, such as approval for an increased level of access or eliminating access after an individual is no longer employed at WelcomeHome
How WelcomeHome communicates to all employees and clients the policies for collecting sensitive information
What does SOC 2 compliance mean to WelcomeHome customers? WelcomeHome internal controls for collecting and storing sensitive data were rigorously tested and performed at a high level.
What does this mean for clients when trusting WelcomeHome with data? Peace of mind. For both the families involved and anyone in internal operations, the level of confidence increases substantially for any community and company with this strategy in place for everyone who has access to sensitive information.