Amplify is SOC 2 Type II compliantAmplify’s SOC 2 Type II compliance demonstrates our commitment to protecting customer data through strong security, operational controls, and ongoing risk management.
An independent third-party auditor has verified that our controls are designed appropriately and operate effectively over time, not just at a single point. This helps customers trust Amplify with sensitive communications across fax, e-sign, forms, and Connect (call, meet, and messaging).
What is SOC 2?
SOC 2 (System and Organization Controls 2) is a security and privacy framework developed by the American Institute of Certified Public Accountants (AICPA). It defines how organizations should manage customer data responsibly. SOC 2 is based on five Trust Services Criteria:- Security – Protection against unauthorized access
- Availability – System uptime and reliability
- Processing Integrity – Accurate and complete processing
- Confidentiality – Protection of sensitive information
- Privacy – Responsible handling of personal data
What Amplify’s SOC 2 compliance covers
Amplify’s SOC 2 Type II report validates controls across our platform, including:- User access management and role-based permissions
- Secure data handling across fax, e-sign, forms, and Connect
- Encryption of data in transit and at rest
- Monitoring, logging, and incident response procedures
- Internal policies, employee training, and vendor risk reviews
SOC 2 focuses on Amplify’s internal controls. Customers are not required to configure anything to benefit from our SOC 2 compliance.
Security Beyond Certification
SOC 2 compliance is not a one-time milestone. At Amplify, we maintain a continuous security and compliance program to ensure our controls remain effective and up to date. Our ongoing practices include:- Regular access and permission reviews
- Continuous monitoring of security systems
- Periodic updates to policies and controls
- Mandatory employee security awareness training
Requesting Amplify’s SOC 2 report
Due to the sensitive nature of SOC 2 reports, access is restricted and shared only under appropriate confidentiality agreements. To request a copy of Amplify’s SOC 2 Type II report:- Reach out to your customer success representative, or
- Submit a request via our Support team
Do customers need to take action?
No.SOC 2 compliance reflects Amplify’s internal security controls and does not require customers to enable, configure, or manage any additional settings. You can continue using Amplify normally while benefiting from our certified security practices.
FAQs
What does SOC 2 Type II mean for Amplify customers?
What does SOC 2 Type II mean for Amplify customers?
SOC 2 Type II confirms that Amplify’s security controls are not only designed correctly but also operate effectively over time, helping protect customer data across fax, e-sign, forms, and Connect.
Does SOC 2 require any setup from my side?
Does SOC 2 require any setup from my side?
No. SOC 2 reflects Amplify’s internal security practices and does not require customers to configure or enable anything in their account.
Is Amplify’s SOC 2 report publicly available?
Is Amplify’s SOC 2 report publicly available?
No. SOC 2 reports contain sensitive security information and are shared only upon request under appropriate confidentiality terms.
Does SOC 2 replace HIPAA compliance?
Does SOC 2 replace HIPAA compliance?
No. SOC 2 and HIPAA address different requirements. SOC 2 focuses on security controls, while HIPAA governs the protection of healthcare information and regulatory compliance.