Our products and devices are embedded with security protections including identity management, high degree of authentication requirements, and data protection designed into edge devices. Flock also builds products using secure software principles and maintains a bug bounty program.
Our cloud and network infrastructure is designed with layers of protection many afforded by AWS services designed for government use including advanced encryption, role based access controls, and secure configuration of technology assets.
Our security operations continuously monitor for malicious activity across our fleet of devices and infrastructure and Flock maintains a high degree of availability afforded through the effective use of services offered by our technology providers.
We work with private entities, public organizations, and researchers to explore the intersection of ethics, safety, and AI.
We've adopted the National Institute of Systems & Technology (NIST) AI Risk Management framework to aid us in the responsible design, development of AI systems.
We've established an internal Responsible AI Committee to advise our adoption of AI in a way that protects the public from potential harm.
Overview of our Service Organization Controls relating to Security, Availability, and Confidentiality Trust Services Categories.
Aligned to Security, Availability, and Confidentiality Trust Services Categories.
Assessment and alignment to a comprehensive framework to identify cloud responsibilities and mitigate risks with shared computing models.
The Higher Education Community Vendor Assessment Tool (HECVAT) is a security assessment targeted for our customers in Higher Education.
Adoption of policies, procedures, and security controls necessary to identify, protect, detect, respond, and recover from cybersecurity events.
Adoption of requirements designed to protect criminal justice information and provide secure access for law enforcement.
Flock provides assurances that we will comply with your requirements for HIPAA Privacy, Security, and the HITECH Act.
Implementation of controls to meet requirements to safeguard student information.