Premier Data Services, a complete IT/Managed Services Provider (MSP), has completed a rigorous third-party examination of its policies and procedures under the Service Organization Controls (SOC) 2, Type 2 standards, demonstrating its commitment to data security and privacy at all levels of its operations.
The demanding third-party examinations were administered by the professional IT assurance and compliance staff at 360 Advanced, a respected national Qualified Security Assessor, HITRUST CSF Assessor and Certified Public Accountant firm based in Tampa, FL.
Developed by the American Institute of Certified Public Accountants (“AICPA”), the Trusted Service Principles (TSP) Framework is based on criteria geared towards technology and cloud-based computing systems, and the TSP Framework is comprised of five standards by which a practitioner is required to examine and report on when analyzing the security of a candidate’s system.
Companies that complete annual SOC assessments are able to demonstrate a substantially higher level of security assurance as compared to those companies without an assessment. An annual SOC 2, Type 2 assessment analyzes security measures as they relate to non-financial controls of an organization such as its IT network and processes, as well as protection of confidential data.
As an IT/MSP, Premier Data Services specializes in compliance and security, overseeing its clients’ infrastructure and network solutions, and ensuring their software systems are not only healthy, but also optimized for performance.
“We are proud of this accomplishment and feel this demonstrates our ongoing commitment to security. Completing the SOC 2 Type 2 assessment shows how serious we take protecting and safeguarding our clients’ information. We value and protect NPPI as though it were money. Our goal is to become a vault for our clients,” said Aaron M. Davis, CEO of Premier Data Services.
ABOUT PREMIER DATA SERVICES
PREMIER DATA SERVICES is an IT/Managed Service Provider that remotely manages a customer’s IT infrastructure and end-user systems with the highest level of security. Its intelligent remote monitoring and security tools provide expert, cost-effective IT management ensuring a company’s system operations are not only healthy, but also optimized for performance.