Skip to main content
Security and Compliance
Updated over a week ago

At Foundational, we are committed to maintaining the highest standards of security and compliance to ensure that your information is protected at all times. This article outlines our security measures and compliance achievements.

SOC 2 Type II Compliance

Foundational is proud to be in compliance with SOC 2 Type II. SOC 2 is an auditing procedure that ensures service providers manage data securely to protect the privacy of their clients. Being SOC 2 Type II compliant means that:

  • Security: We have robust measures in place to protect against unauthorized access (both physical and logical).

  • Availability: Our systems are reliable and we maintain high levels of uptime.

  • Processing Integrity: We ensure that system processing is complete, valid, accurate, timely, and authorized.

  • Confidentiality: We protect the confidentiality of the information we process.

  • Privacy: We manage personal information in accordance with our privacy policy and in compliance with the criteria set forth in the generally accepted privacy principles.

Foundational Does Not Access Your Data

At Foundational, we never access customer data. Instead, we only access metadata, such as table schemas. As a result, Foundational is not considered a data processor for our customers.

Trust Center

For a detailed overview of our security practices and compliance status, please visit our Trust Center. The Trust Center provides comprehensive information on:

  • Security policies

  • Compliance reports

  • Data protection measures

  • Privacy policies

  • Incident response protocols

By visiting the Trust Center, you can gain insight into how we maintain the security and privacy of your data and our commitment to upholding industry standards.

Did this answer your question?