How does Vetster protect information from unauthorized access and data breaches?

Vetster uses a layered security program that combines policies, trained people, and technical controls to keep data safe. Access to records is limited to authorized users with a job-related need, consistent with Vetster policies and applicable laws.

About SOC 2:
Vetster maintains a SOC 2 security program. SOC 2 (Service Organization Control 2) is an independent audit framework developed by the AICPA that evaluates how a company safeguards data across the Trust Services Criteria, including security, availability, processing integrity, confidentiality, and privacy.

Key safeguards include:

  • Encryption in transit and at rest
  • Role-based access control, least-privilege permissions, and multi-factor authentication
  • Continuous logging and monitoring, vulnerability management, and regular third-party testing
  • Secure software development practices and change control
  • Employee security training and vetted vendor management
  • Regular backups and documented incident response and disaster recovery procedures

A summary of our security practices and SOC 2 posture can be provided on request.