Request access

Trust Center

Protecting Communities is Our #1 Priority

Flock Safety's Security Team has created robust policies, procedures, and controls that are regularly audited by third parties, so you can feel confident about the safety of your data.

How Flock Earns Your Trust

We promote the responsible use of technology and maintain operational resiliency, which is why we’ve implemented controls to safeguard the privacy and security of sensitive customer data. These safeguards are routinely assessed by third parties to ensure continuous adherence to industry standards.


The protection of our customers’ data is essential, and we prioritize secure design, data integrity, and operational resiliency for all of our products and systems.

Learn More

Responsible AI

Our technology enables and accelerates our customers’ work, and we build systems with requirements to perform as intended while promoting societal values and centering on human responsibility.

Learn More


Our entire company relentlessly focuses on adhering to applicable laws, regulations, and industry frameworks, and we aggressively seek certifications to demonstrate our ongoing commitment.

Learn More

Protecting Your Data

Flock Safety’s systems protect your data by taking a security-by-default approach. We design and build our platform and devices using availability, scalability, and security best practices.

Robust Product Security Protections 

Our products and devices are embedded with advanced security protections, including identity management, a high degree of authentication requirements, and data protection designed into edge devices. We also build products using secure software principles and maintain a bug bounty program.

Multi-Layered Infrastructure Security

Our cloud and network infrastructure employs multi-layered security controls, leveraging Amazon Web Services, which is designed for stringent government security requirements and includes advanced encryption, role-based access controls, and the secure configuration of technology assets.

Operational Resiliency

Our Security Operations team continuously monitors our fleet of devices and infrastructure for malicious activity, and we are proud of the operational resiliency that our effectiveness affords us.

Responsible AI

Our principles for helping keep communities safe with AI

Building Partnerships

We consistently work with private entities, public organizations, and research organizations to explore the intersection of ethics, safety, and AI.

Risk Management

We've adopted the National Institute of Systems & Technology (NIST) AI Risk Management framework to aid us in the responsible design and development of AI systems.

Trustworthy AI

We've established an internal Responsible AI Committee to advise our adoption of AI in a way that is mindful of the potential risks involved.


Compliance & Attestations

Flock Safety's Compliance Program helps customers understand our robust controls for securing data and ensuring service availability. We recognize our role in the compliance network and diligently adhere to relevant Cybersecurity Laws, Regulations, Attestations, and Frameworks that matter to our customers.


Overview of our Service Organization Controls relating to Security, Availability, and Confidentiality Trust Services Categories.

SOC 2 (Type 2)

Aligned to Security, Availability, and Confidentiality Trust Services Categories.

Cloud Security Alliance’s CAIQ

Assessment of and alignment to a comprehensive framework that identifies cloud responsibilities and mitigates risks with shared computing models.


The Higher Education Community Vendor Assessment Tool (HECVAT) is a security assessment that applies to our customers in higher education.

NIST Cybersecurity

Adoption of policies, procedures, and security controls necessary to identify, protect, detect, respond, and recover from cybersecurity events.


Adoption of requirements designed to protect criminal justice information and provide secure access for law enforcement.


Flock provides assurances that we will comply with your requirements for HIPAA Privacy, Security, and the HITECH Act.


Implementation of controls to meet requirements to safeguard student information.