You're on our English website. Change your region to see information for another location.
(SizeLimitingPyMap: {image={size_type=exact, src=https://www.rmscloud.com/hubfs/RMS%20GLB%20Website%2022/RMS_2022/icons/rms-logo.svg, alt=rms-logo, loading=lazy, width=140, height=52}, link={url={type=CONTENT, content_id=76693126988, href=https://www.rmscloud.com, href_with_scheme=}, open_in_new_tab=false, no_follow=false, sponsored=false, user_generated_content=false, rel=}})
Service Organisation Control (SOC) reporting uses established standards to report on the appropriateness and effectiveness of a service organisation's internal controls. Customers and prospects then use the report to understand a vendor's internal processes and ensure that their data is being handled with the highest level of protection, compliance and reliability.
Unlike many other optional reporting standards, SOC certifications require an independent audit. For an organisation to claim any SOC accreditation, an independent auditor must verify and sign off that the appropriate controls are in place and designed effectively. Type 2 reports raise the bar even higher: the auditor must also confirm that controls have operated effectively over a specific period.
There are two types of SOC reports:
Understanding the SOC 2 certification
SOC 2 is an auditing standard developed by the American Institute of Certified Public Accountants (AICPA). SOC 2 outlines essential principles for managing customer data, including security, availability, processing integrity, confidentiality and privacy.
1. Security
The security principle refers to the protection of system resources against unauthorised access. Access controls help prevent potential system abuse, theft or unauthorised data removal, software misuse, and improper information alteration or disclosure.IT security tools such as network and web application firewalls (WAFs), two-factor authentication and intrusion detection help prevent security breaches that can lead to unauthorised access to systems and data.
The availability principle refers to the system's accessibility, products or services as stipulated by a contract or service level agreement (SLA). As such, both parties set the minimum acceptable performance level for system availability.
This principle does not address system functionality and usability but does involve security-related criteria that may affect availability.
Monitoring network performance and availability, site failover and security incident handling are critical in this context.
The processing integrity principle addresses whether or not a system achieves its purpose (i.e., delivers the right data at the right price at the right time). Accordingly, data processing must be complete, valid, accurate, timely and authorised.
However, processing integrity does not necessarily imply data integrity. If data contains errors before being input into the system, detecting them is not usually the responsibility of the processing entity. Monitoring of data processing, coupled with quality assurance procedures, can ensure processing integrity.
Data is considered confidential if its access and disclosure are restricted to a specified set of persons or organisations. Examples may include data intended only for company personnel, as well as room occupancy, rates, and customer contact details and other types of sensitive financial information.
Encryption is an essential control for protecting confidentiality during transmission. Network and application firewalls and rigorous access controls are used to safeguard information while being processed or stored on computer systems.
The privacy principle addresses RMS' collection, use, retention, disclosure and disposal of personal information in conformity with an organisation's privacy notice and with criteria outlined in the AICPA's generally accepted privacy principles (GAPP).
Personal identifiable information (PII) refers to details that distinguish an individual (e.g., name, address, Social Security number). Some personal data related to health, race, sexuality and religion is also considered sensitive and generally requires an extra level of protection. Controls are necessary to protect all PII from unauthorised access.
We take our commitment to protect your company, employees and customers seriously. The SOC 2 Type 2 compliance is a testament to our commitment to protecting your data to the highest possible levels.
At RMS, we understand the critical role of information security for all property managers around the world. By choosing RMS, you can be confident that your property management systems requirements will be met with an unwavering commitment to security.
You can review our SOC 2 Type 2 report and our other compliance certifications at our trust centre.