Trust Center
Flock's Security Team has diligently created policies, procedures and controls that are regularly being audited by third-parties so you can feel confident about the safety of your data.
Flock has implemented controls to safeguard the privacy and security of sensitive customer data we are trusted with, we promote the responsible use of technology and maintain operational resiliency. These safeguards are routinely assessed by third parties to ensure continuous adherence to industry expectations.
Protection of our customers’ data is essential and we prioritize secure design, data integrity, and operational resiliency of our products and systems.
Our technology is used to enable and accelerate our customer’s work and we build systems with requirements to perform as intended, promote societal values, and center on human responsibility.
Our company has a relentless focus on adhering to applicable laws, regulations, and industry frameworks and we aggressively seek certifications to demonstrate our ongoing commitment.
We take a security-by-default approach to protecting your data. We design and build Flock’s platform and devices using best practices for availability, scalability, and security.
Our products and devices are embedded with security protections including identity management, high degree of authentication requirements, and data protection designed into edge devices. Flock also builds products using secure software principles and maintains a bug bounty program.
Our cloud and network infrastructure is designed with layers of protection many afforded by AWS services designed for government use including advanced encryption, role based access controls, and secure configuration of technology assets.
Our security operations continuously monitor for malicious activity across our fleet of devices and infrastructure and Flock maintains a high degree of availability afforded through the effective use of services offered by our technology providers.
We work with private entities, public organizations, and researchers to explore the intersection of ethics, safety, and AI.
We've adopted the National Institute of Systems & Technology (NIST) AI Risk Management framework to aid us in the responsible design, development of AI systems.
We've established an internal Responsible AI Committee to advise our adoption of AI in a way that protects the public from potential harm.
The Compliance program at Flock Safety helps customers understand the robust controls that we’ve designed and operate effectively to secure data and maintain availability of our services. We understand that we are part of a network of compliance and we do our part to comply with Cybersecurity Laws, Regulations, Attestations, and Frameworks that matter to you.
Overview of our Service Organization Controls relating to Security, Availability, and Confidentiality Trust Services Categories.
Aligned to Security, Availability, and Confidentiality Trust Services Categories.
Assessment and alignment to a comprehensive framework to identify cloud responsibilities and mitigate risks with shared computing models.
The Higher Education Community Vendor Assessment Tool (HECVAT) is a security assessment targeted for our customers in Higher Education.
Adoption of policies, procedures, and security controls necessary to identify, protect, detect, respond, and recover from cybersecurity events.
Adoption of requirements designed to protect criminal justice information and provide secure access for law enforcement.
Flock provides assurances that we will comply with your requirements for HIPAA Privacy, Security, and the HITECH Act.
Implementation of controls to meet requirements to safeguard student information.