img-2

TRUST CENTER

You trust us with your information.
We take that seriously.

Your information is not only important to you, it’s important to us. We recognize the importance of maintaining the confidentiality, integrity, and availability of your information as well as the protection of our own valuable business assets and applications. This Trust Center reflects our commitment to providing a secure environment and adopting effective security standards that exceed industry best practices in the areas of information security and compliance.

With the use of a variety of reliable security technologies as well as a unique combination of trained personnel, mature business processes, and regular third-party audits measured against several international and U.S. standards, we deliver a high level of security and confidence that is unmatched in the industry.

Our Trust Center describes each layer of this assurance approach to provide an overview of the compliance, data protection, and cybersecurity that we provide.

Information Security Responsibilities

Research Collective maintains controls that support an industry-recognized framework to ensure due care and diligence in maintaining our information security program.

This information security framework is detailed into five (5) categories of controls that include:

img-3

Identify

We consider these controls foundational for effective information security and privacy. By understanding the business context, resources that support critical functions and the related information security risks, we focus our efforts and resources to properly secure the network and cloud resources.

Protect

Our information security controls focus on implementing the appropriate safeguards to ensure the safe functionality of systems, applications, and services. These activities are performed consistently with our risk strategy and support the ability to limit or contain the impact of a potential information security event.

Detect

These controls focus on situational awareness to ensure the timely identification and response to potential information security or privacy incidents. By decreasing response time, we increase our ability to limit or contain incidents with the least amount of negative consequences.

Respond

The focus of the Respond controls is on the processes used to act when an information security or privacy event is detected. These controls support our team’s ability to contain the impact of a potential incident.

Recover

These controls focus on restoring capabilities or services that were impaired during an incident. The Recover controls support our ability to return to “normal” operations as rapidly as possible and with minimal disruption.

CONNECT

We look forward to hearing from you! Please complete the form below and a Research Collective team member will get back with you shortly.

"*" indicates required fields