PiperChat Security Portal
Powered by Middle Out Compression, PiperChat is the world's premier video chat platform. At PiperChat, we value the security of your data above all.
Backups
Our solution is backed up to the Hooli Cloud and is personally guaranteed by Gavin Belson. All data is encrypted using the impenetrable ROT13 standard.
Maintenance Schedule Downtime
Downtime is scheduled and communicated to customers via direct calls from Gilfoyle using our PiperChat platform. Calls are made in 4k over 3G connections. Very impressive?
Change Control Documentation
Production Change Control
Software Development Lifecycle
Its best you don't ask about this. We seldom are all on the same page with anything and push up code changes or even pivot the company on a whim.
Production Data in Non-Production Environments
When production data is used in our test environment is goes through a strict sanitization process.
Secure Web Traffic
All web traffic uses HTTPS / TLS 1.2.
Business Associate Contract (BAA)
Financial Information
Our platform stores the number of commas in your net worth and make it public if you have more than 2.
Personally Identifiable Information (PII)
User profiles are stored containing the following information:
First Name
Last Name
Email Address
Profile Photo
CCPA Compliance
PiperChat's platform was built after the GDPR was in place, and therefore we developed the product with the principles of Privacy by Design and GDPR compliance.
Protected Health Information (PHI)
GDPR Compliance
PiperChat's platform was built after the GDPR was in place, and therefore we developed the product with the principles of Privacy by Design and GDPR compliance.
Penetration Testing
We've been hacked by one of Dinesh's girlfriends. While we did not hire her, she really made a mess of things and we learned a lot.
External Vulnerability Scanning
Anti-Malware Policy
Internal Vulnerability Scanning
Vulnerability Management Process
Vulnerabilities are managed based on risk level:
Critical - Resolved within 24 hours
High - Resolved within 7 days
Medium - Resolved within 30 days
Physical Security Policy
Customer Data Removal
Our compression algorithim is so good, we never need to delete your data. Erlich says you're welcomed!
Data Encrypted in Transit
Our compression algorithm is so proprietary and indecipherable it also serves as encryption so we're good here.
Single Sign On
SAML and Hooli Identity can be used to support single sign-on.
Service Level Agreement
Data Encrypted at Rest
Vendor Management Re-Assessment
Vendor Management Review
Action Plan Approval
Approved Risk Management Program
Vendor Policy Review
Privacy Risk Assessment
Risk Ownership
Action Plan Status
Employee Agreements
Security Awareness Training
Off-boarding Process
Human Resource Policy
Background Screening
Roles and Responsibilities
Disciplinary Process
Log Review and Alerting
Log Collection and Storage
Intrusion Prevention
Network Device Hardening
Intrusion Detection
Asset Management Policy
Data Classification
Removable Media Policy
Business Resiliency Plan
Business Continuity Plan
Recovery Time Objective
Recovery Point Objective
Staff Scoped Data Access
Internally Shared User Accounts
We do not share user account as per our CyberSecurity policy.
Internal Compliance Department
Formal Incident Response Plan
Policy Review Cadence
Information Security Policy
Designated Security Point of Contact

FedRAMP
scheduled 11/17/2022

SOC 2
completed 02/16/2022

