Compliance

B-HiTech > compliance

Security & Compliance Program

B-HiTech maintains a security and compliance program designed to align with major industry frameworks such as ISO/IEC 27001 and SOC 2. This page summarizes the controls and governance practices we follow to protect customer data and reduce risk.

Program Coverage

ISO/IEC 27001

Information Security Management System (ISMS) governance, risk assessments, asset inventory, and continuous control reviews.

SOC 2 (Security, Availability, Confidentiality)

Security policies, change management, incident response, vendor risk oversight, and audit-ready evidence collection.

GDPR / Global Privacy

Lawful basis handling, data minimization, retention limits, data subject request workflows, and cross-border transfer safeguards.

CCPA/CPRA

Consumer rights workflows, notice obligations, and internal response procedures for access, deletion, and correction requests.

Operational Security Baseline

Secure SDLC, vulnerability management, logging and monitoring, access control, encryption in transit, and business continuity planning.

Technical Safeguards

Important Note on Certifications

Compliance readiness and alignment are ongoing activities. Formal certifications or attestations (including ISO certificates and SOC 2 reports) require independent audits and are only claimed when officially issued.