Skip to main content

Compliance & Certifications

Overview

mixus maintains rigorous compliance with industry-leading security standards and privacy regulations to ensure your data is protected according to the highest global standards. Our compliance program demonstrates our commitment to security, privacy, and operational excellence. We regularly undergo third-party audits and assessments to verify our compliance with these standards and continuously improve our security posture.

Current Certifications

πŸ›‘οΈ SOC 2 Type II

Security, Availability, Processing Integrity, Confidentiality, and Privacy Status: Currently in audit process for initial certification What SOC 2 Type II Covers
  • Security: Protection against unauthorized access
  • Availability: System and service availability commitments
  • Processing Integrity: Data processing accuracy and completeness
  • Confidentiality: Protection of confidential information
  • Privacy: Collection, use, retention, and disclosure of personal information
Benefits for Customers
  • Independent verification of security controls
  • Detailed audit reports available upon request
  • Evidence of operational security effectiveness
  • Assurance of data protection standards

🌍 GDPR Compliance

General Data Protection Regulation Status: Fully compliant since May 2018 Key GDPR Rights Supported
  • Right to Access: View all personal data we hold
  • Right to Rectification: Correct inaccurate data
  • Right to Erasure: Delete personal data (β€œright to be forgotten”)
  • Right to Restrict Processing: Limit how data is processed
  • Right to Data Portability: Export data in machine-readable format
  • Right to Object: Opt-out of certain processing activities
Technical and Organizational Measures
  • Privacy by design and by default
  • Data protection impact assessments
  • Data processing agreements with all vendors
  • Appointment of Data Protection Officer
  • Breach notification procedures (72-hour requirement)

πŸ›οΈ CCPA Compliance

California Consumer Privacy Act Status: Fully compliant Consumer Rights Protected
  • Right to Know: Information about data collection and use
  • Right to Delete: Deletion of personal information
  • Right to Opt-Out: Opt-out of sale of personal information
  • Right to Non-Discrimination: No penalties for exercising rights
Implementation
  • Clear privacy notices and disclosures
  • Consumer request portal for exercising rights
  • Opt-out mechanisms for data sales (we don’t sell data)
  • Staff training on CCPA requirements

Certifications in Progress

πŸ”’ ISO 27001

Information Security Management Systems Status: Pursuing certification (expected 2025) ISO 27001 Requirements
  • Information security management system (ISMS)
  • Risk assessment and treatment processes
  • Security controls implementation
  • Continuous monitoring and improvement
  • Management commitment and responsibility
Benefits
  • International recognition of security practices
  • Systematic approach to managing information security
  • Continuous improvement framework
  • Enhanced customer confidence

πŸ₯ HIPAA (Available)

Health Insurance Portability and Accountability Act Status: Available for healthcare customers with Business Associate Agreement HIPAA Safeguards
  • Administrative Safeguards: Security officer, workforce training, access management
  • Physical Safeguards: Facility access controls, workstation use restrictions, device controls
  • Technical Safeguards: Access control, audit controls, integrity, transmission security
Requirements for HIPAA Compliance
  • Business Associate Agreement (BAA) execution
  • Healthcare or covered entity status
  • Enhanced security controls for PHI
  • Additional audit and monitoring requirements

Industry-Specific Compliance

πŸ“Š SOX Compliance Support

Sarbanes-Oxley Act For Publicly Traded Customers
  • Financial controls and audit trail capabilities
  • Data integrity and access controls
  • Change management procedures
  • Audit logging and monitoring

πŸ’³ PCI DSS Considerations

Payment Card Industry Data Security Standard Current Status
  • Not directly applicable (we don’t store payment card data)
  • Payment processing handled by PCI DSS compliant providers
  • Secure transmission of payment data to processors

Global Privacy Regulations

πŸ‡ͺπŸ‡Ί European Regulations

GDPR (General Data Protection Regulation)
  • Comprehensive privacy protection for EU residents
  • Data subject rights and controller obligations
  • Privacy by design requirements
  • Significant penalties for non-compliance
ePrivacy Regulation
  • Cookie consent and tracking protection
  • Electronic communications privacy
  • Marketing communications consent

πŸ‡ΊπŸ‡Έ United States Regulations

CCPA (California Consumer Privacy Act)
  • Consumer privacy rights in California
  • Business obligations for data handling
  • Opt-out rights for data sales
COPPA (Children’s Online Privacy Protection Act)
  • Special protections for children under 13
  • Parental consent requirements
  • Educational use exceptions

🌏 International Regulations

Brazil LGPD (Lei Geral de ProteΓ§Γ£o de Dados)
  • Brazilian privacy protection law
  • Similar rights to GDPR
  • Local data protection requirements
Canada PIPEDA (Personal Information Protection and Electronic Documents Act)
  • Canadian privacy protection standards
  • Consent requirements for data collection
  • Data breach notification obligations

Audit and Assessment Program

πŸ” Third-Party Audits

Annual Security Assessments
  • SOC 2 audits by certified public accounting firms
  • Penetration testing by independent security firms
  • Vulnerability assessments and remediation
  • Code security reviews and analysis
Compliance Monitoring
  • Continuous compliance monitoring tools
  • Regular internal audits and assessments
  • Gap analysis and remediation planning
  • Policy and procedure reviews

πŸ“‹ Internal Controls

Security Controls Framework
  • Based on NIST Cybersecurity Framework
  • ISO 27001 control objectives
  • SOC 2 trust service criteria
  • Regular control testing and validation
Risk Management
  • Formal risk assessment procedures
  • Risk treatment and mitigation plans
  • Regular risk monitoring and reporting
  • Third-party risk assessments

Data Processing Agreements

🀝 Customer DPAs

Data Processing Agreements Available
  • GDPR-compliant data processing terms
  • Clear roles and responsibilities
  • Security measure specifications
  • Sub-processor transparency
Standard DPA Terms
  • Data processing purposes and categories
  • Security measures and controls
  • Data breach notification procedures
  • Data subject rights support

πŸ”— Vendor Management

Sub-Processor Requirements
  • All vendors undergo security assessments
  • Data processing agreements with security requirements
  • Regular vendor audits and monitoring
  • Approved vendor list maintained and updated

Incident Response and Breach Notification

🚨 Incident Response

24/7 Incident Response
  • Dedicated incident response team
  • Escalation procedures and communication plans
  • Forensic analysis and containment procedures
  • Recovery and lessons learned processes
Breach Notification Procedures
  • GDPR: Notification to supervisory authority within 72 hours
  • Customer Notification: Within 72 hours if high risk to individuals
  • Documentation: Complete incident documentation and reporting
  • Remediation: Implementation of corrective measures

πŸ“Š Compliance Reporting

Regular Reporting
  • Annual compliance status reports
  • Quarterly security metrics and KPIs
  • Incident summary reports
  • Control effectiveness assessments
Audit Evidence
  • SOC 2 reports available to enterprise customers
  • Compliance documentation and evidence
  • Security control testing results
  • Third-party assessment reports

Regional Compliance Requirements

πŸ‡ͺπŸ‡Ί European Union

Data Residency
  • EU data centers available for European customers
  • Cross-border transfer safeguards
  • Standard contractual clauses (SCCs)
  • Adequacy decision compliance
Regulatory Authorities
  • Cooperation with data protection authorities
  • Response to regulatory inquiries
  • Compliance with enforcement actions
  • Regular regulatory updates monitoring

πŸ‡ΊπŸ‡Έ United States

State Privacy Laws
  • Compliance with state-specific requirements
  • Monitoring emerging state privacy legislation
  • Adaptation to new regulatory requirements
  • Multi-state compliance coordination
Federal Requirements
  • Compliance with applicable federal laws
  • Sector-specific regulations (healthcare, financial)
  • Government contracting requirements
  • Export control compliance

Compliance Support

πŸ“‹ Customer Compliance

Compliance Documentation
  • Security questionnaire responses
  • Compliance certification copies
  • Data processing documentation
  • Audit reports and assessments
Implementation Support
  • Compliance consultation services
  • Configuration guidance for compliance requirements
  • Training and education resources
  • Best practices documentation

πŸŽ“ Training and Awareness

Staff Training
  • Regular compliance training for all employees
  • Role-specific compliance requirements
  • Privacy and security awareness programs
  • Incident response training and simulations
Customer Education
  • Compliance webinars and workshops
  • Best practices guides and documentation
  • Regular compliance updates and alerts
  • Industry-specific compliance guidance

Future Compliance Initiatives

πŸ”„ Continuous Improvement

Planned Certifications
  • ISO 27001 certification completion
  • Additional regional compliance certifications
  • Industry-specific compliance standards
  • Enhanced security control frameworks
Emerging Regulations
  • Monitoring of new privacy and security regulations
  • Proactive compliance planning and implementation
  • Stakeholder engagement and feedback
  • Regulatory impact assessments

Contact Information

🀝 Compliance Inquiries

General Compliance Questions
  • Email: support@mixus.com
  • Response time: 5 business days
  • Include specific compliance requirements
  • Reference applicable regulations or standards
Audit and Assessment Requests
  • Security questionnaire completion
  • Compliance documentation requests
  • SOC 2 report access (enterprise customers)
  • Custom compliance assessments

πŸ“‹ Documentation Requests

Available Documents
  • SOC 2 reports (when available)
  • Compliance certifications
  • Data processing agreements
  • Security and privacy policies

Our compliance program demonstrates our commitment to protecting your data according to the highest global standards. We continuously invest in compliance to earn and maintain your trust.
⌘I