Data Management With Revver
Revver securely manages sensitive client, case, employee, vendor/third party, and business information across thousands of accounts. Revver has been awarded certificates that verify that Revver has the technical safeguards in place to govern business activities, protect customer data, and manage risk. Accompanying the official certifications awarded to Revver, there are additional regulatory bodies governing various industries that Revver has the tools to help businesses comply with.
The listed compliance requirements met by Revver is not an exhaustive list.
Revver Certificates
Revver’s robust, ever-improving processes follow security best practices to ensure compliance with customers’ internal and external regulations. These reports are evidence of Revver’s ongoing commitment to effective data protection and management, and certify that Revver handles sensitive business or client information accordingly.
Revver undergoes rigorous audits driven by third-party auditors on a regular cadence and have received the following certifications:
SOC 1 Type II
Revver has received a report issued by an independent third-party auditor regarding internal controls over financial reporting (ICFR).
ISO 27001:2013
Revver was approved by an independent and third-party ANAB accredited auditing service. This certifies that Revver complies with the requirements for maintaining an information security management system.
FINRA Compliance Vendor Directory
Revver is part of the FINRA CVD. The directory is a service that allows financial organizations to search for FINRA recognized compliance-related services
SOC 2 Type II
Revver has received this internal controls report issued by an independent third-party auditor. The report captures how a company protects customer data and how thoroughly the required controls are operating.
The SOC reports are based on the Trust Services Criteria which include security, availability, processing integrity, confidentiality, and/or privacy.
CSA Star L1 (CAIQ)
Revver has participated in the public-facing self assessment questionnaire hosted on the Cloud Security Alliance STAR Registry.
Compliance With Relevant Regulatory and Security Requirements
The security and governance controls available within Revver also can play a critical role for customers to comply with relevant regulatory and security requirements for their organization. These laws and regulations include:
- HIPAA – Health Insurance Portability and Accountability Act
- GDPR – General Data Protection Regulation
- DPF – Data Privacy Framework
- WORM – Write Once, Read Many
As these regulations and policies depend upon corporate processes and how tools like Revver are used, they are not applied directly to the Revver product. Instead, an organization can determine what regulations and requirements are applicable to their business and industry and guide their data processes accordingly. Revver has all of the tools and controls needed for an organization to maintain compliance with these regulations in regards to data management.
Specialized Revver Security Applications
Revver’s integrated suite of tools is designed to help you manage every aspect of the information lifecycle. Businesses can realize complete control and visibility over how their data is stored, shared, and accessed. Revver allows for customization and standardization of the security measures across an organization to keep in line with key industry or government regulations.
To empower organizations in their compliance efforts and to enable the highest security standard, Revver includes many helpful security capabilities:
- Comprehensive audit logs: See all of the actions taken on your documents by different users.
- Customizable item permissions: Control who can see which files and what rights they have to those files (view, download, create, write, delete, admin). Easily and accurately grant and revoke permissions through group management.
- Folder templates: Structured folder templates can be automatically applied to create consistent sets of folders in a specific hierarchy, and can even include a standard set of documents. Templates can be tied to item permissions and ensure files and folders, as well as permissions, are consistent and reliably follow policies or standards.
- Sharing restrictions: Control who can share, what can be shared, and how long items are shared for. Users can control and revoke access to shared documents as needed.
- Powerful retention options: Lock specific files or folders so that they are protected for a specific period of time or indefinitely. This includes protection from data being deleted, edited, moved, and/or shared as needed.
- Tailored security policies: Create one or more security policies that can apply to all users or certain groups with different security requirements, from password requirements, two-factor authentication, IP address restrictions, requiring SSO, and more.
Revver’s security capabilities don’t end there. There are even more security measures than those listed here that can help you optimize all security operations and streamline the information lifecycle. Legacy methods of data management lack the freedom and effectiveness provided by Revver. Contact us to discuss your security needs to see how Revver can make the difference.