Pink circle
Small pink circle


Commitment to Security 

At Kamsa, security is one of our top priorities.  We use state-of-the-art tools and perform continuous monitoring to ensure that your data is protected.  Included below are the measures we take to protect our Clients.

  • Penetration Testing - We perform independent third-party penetration tests biannually.
  • Security Awareness Training - Our employees complete security awareness training annually.
  • Third-Party Audits - We complete an independent, third-party assessment to test our security controls annually.
  • Roles and Responsibilities - Roles and responsibilities related to our information security program and the protection of our customer’s data are well defined and documented.
  • Security Policies

Our team commits to comply with our security policies, which follow the criteria set forth by SOC 2. These policies include our Code of Conduct, Acceptable Use Policy, Access Control and Termination Policy, Business Continuity and Disaster Recovery Plan, Change Management Policy, Configuration and Asset Management Policy, Data Classification Policy, Data Retention and Disposal Policy, Encryption and Key Management Policy, Information Security Policy, Internal Control Policy, Network Security Policy, Performance Review Policy, Risk Assessment and Treatment Policy, Secure Development Policy, Security Incident Response Plan, Vendor Management Policy, and Vulnerability and Patch Management Policy. 

If you have any concerns, please don’t hesitate to contact us at [email protected] 

Would you like to report a potential issue anonymously?