SOC 2 Type II Compliance

As part of our ongoing SOC 2 Type II process, KEYSYS makes the following commitments to our customers:


We will keep customer data secure utilizing data encryption, authentication mechanisms, logical security and other relevant security controls.


We will maintain the confidentiality of customer’s data through data handling, classification, and destruction and retention policies, data encryption and other relevant security and confidentiality controls.


KEYSYS has made commitments related to availability including but not limited to monitoring of processing capacity and system performance, data backups, replication (where applicable) for redundant data storage, and disaster recovery and contingency plans and testing of those plans when applicable per client agreements.

hear from our clients

Trusting Keysys with programming our latest high quality, scientifically-based learning game, Filtered, was the right decision. Keysys is a willing and engaged collaborator that brings the creativity, style, and the talent we need. We can’t wait to see the final product and distribute it nationally. Thanks to the Keysys team, this is just around the corner.

Dr. Adam M. Hott

Digital Applications Lead / Expanding Solutions Expert, Hudson Alpha