Skip to main content

Security Practices

Providing you with data security is a high priority of Provectus. We put a wide range of security measures and maintain policies and procedures to comply with required data security standards, and we continue to take all the necessary measures to improve our information security level to ensure the safety and privacy of your data.

If we do detect something risky that we think you should know about, we'll notify you and help guide you through steps to stay better protected.

The security measures we have in place are designed to protect against unauthorized access, alteration, disclosure or destruction of the information we hold, including:

Provectus does not sell, share, or trade any customer data. Your information and your company's information are not for sale and never will be. Access to customer data is restricted to individuals who require that information to fulfill their job duties. We only hire individuals of the highest integrity.

As assessed by Johanson Group LLP, Provectus IT, Inc. is SOC 2 compliant. The company's service commitments and system requirements meet the trust services criteria relevant to security (applicable trust services criteria) set forth in TSP section 100, 2017 Trust Services Criteria for Security, Availability, Processing Integrity, Confidentiality, and Privacy (AICPA, Trust Services Criteria).