Request access

Trust Center

Protecting Communities is Our #1 Priority

Flock's Security Team has diligently created policies, procedures and controls that are regularly being audited by third-parties so you can feel confident about the safety of your data.

How Flock earns your trust

Flock has implemented controls to safeguard the privacy and security of sensitive customer data we are trusted with, we promote the responsible use of technology and maintain operational resiliency. These safeguards are routinely assessed by third parties to ensure continuous adherence to industry expectations.


Protection of our customers’ data is essential and we prioritize secure design, data integrity, and operational resiliency of our products and systems.

Learn More

Responsible AI

Our technology is used to enable and accelerate our customer’s work and we build systems with requirements to perform as intended, promote societal values, and center on human responsibility.

Learn More


Our company has a relentless focus on adhering to applicable laws, regulations, and industry frameworks and we aggressively seek certifications to demonstrate our ongoing commitment.

Learn More

Protect your data

We take a security-by-default approach to protecting your data. We design and build Flock’s platform and devices using best practices for availability, scalability, and security.

Secure Product

Our products and devices are embedded with security protections including identity management, high degree of authentication requirements, and data protection designed into edge devices. Flock also builds products using secure software principles and maintains a bug bounty program.

Secure Infrastructure

Our cloud and network infrastructure is designed with layers of protection many afforded by AWS services designed for government use including advanced encryption, role based access controls, and secure configuration of technology assets.

Operational Resiliency

Our security operations continuously monitor for malicious activity across our fleet of devices and infrastructure and Flock maintains a high degree of availability afforded through the effective use of services offered by our technology providers.

Responsible AI

Our principles for helping keep communities safe with AI

Building Partnerships

We work with private entities, public organizations, and researchers to explore the intersection of ethics, safety, and AI.

Risk Management

We've adopted the National Institute of Systems & Technology (NIST) AI Risk Management framework to aid us in the responsible design, development of AI systems.

Trustworthy AI

We've established an internal Responsible AI Committee to advise our adoption of AI in a way that protects the public from potential harm.


Compliance & attestations

The Compliance program at Flock Safety helps customers understand the robust controls that we’ve designed and operate effectively to secure data and maintain availability of our services. We understand that we are part of a network of compliance and we do our part to comply with Cybersecurity Laws, Regulations, Attestations, and Frameworks that matter to you.


Overview of our Service Organization Controls relating to Security, Availability, and Confidentiality Trust Services Categories.

SOC 2 (Type 2)

Aligned to Security, Availability, and Confidentiality Trust Services Categories.

Cloud Security Alliance’s CAIQ

Assessment and alignment to a comprehensive framework to identify cloud responsibilities and mitigate risks with shared computing models.


The Higher Education Community Vendor Assessment Tool (HECVAT) is a security assessment targeted for our customers in Higher Education.

NIST Cybersecurity

Adoption of policies, procedures, and security controls necessary to identify, protect, detect, respond, and recover from cybersecurity events.


Adoption of requirements designed to protect criminal justice information and provide secure access for law enforcement.


Flock provides assurances that we will comply with your requirements for HIPAA Privacy, Security, and the HITECH Act.


Implementation of controls to meet requirements to safeguard student information.