Skip to content
BROCHURE

Security and Privacy Overview

lock and key representing data security

Compliance & Data Security at Every Step

When using Canopy’s Data Breach Response and Privacy Audit software, you can have confidence that your data is secure from transfer and review through to the notification process.

Canopy actively maintains an ISO 27001 certification and we regularly conduct third-party penetration (pen) testing.

Download this brochure to explore more security measures, including how our software:

  • Complies with various data residency laws & transport regulations
  • Remains fully proprietary (no data shared with third parties)
  • Moves data securely into and out of the application

Get the Brochure

When it comes to data mining, the lowest bid is not always the least expensive option overall. This phase has a trickle-down effect across the rest of the breach response process.