Organizational Security
  1. • Information Security Program
    • We have an Information Security Program in place that is communicated throughout the organization. Our Information Security Program follows the criteria set forth by HIPAA.
    • PrintComm in the process of becoming SOC 2 Certified.
  2. • Third-Party Audits
    • PrintComm undergoes independent third-party assessments to test our security and compliance controls at least annually and we remediate as needed.
  3. • Third-Party Penetration Testing
    • We partner with an independent company for penetration testing at least annually and we remediate as needed.
  4. • Roles and Responsibilities
    • Roles and responsibilities related to our Information Security Program and the protection of our customer’s data are well defined and documented. Our team members are required to review and accept all security policies.
  5. • Security Awareness Training
    • Team members go through security awareness training during onboarding and at least annually after that.
  6. • Confidentiality
    • Team members sign and adhere to an industry standard confidentiality agreement prior to their first day of work.
  7. • Background Checks
    • We perform background checks as part of our hiring process.
Data Security
  1. • On Premise Data Security
    • Servers/devices storing customer data on premise are kept in a locked, climate-controlled, video-monitored location. Data is encrypted in transit and at rest.
  2. • Vulnerability Scanning
    • We perform vulnerability scanning and actively monitor for threats.
  3. • Incident Response
    • We have a process for handling information security events which includes escalation procedures, rapid mitigation and communication.
Access Security
  • Where available we use multi-factor authentication (MFA)
  • We follow the principle of least privilege.
  • We perform regular access reviews for all team members authorized to access sensitive systems.
  • Team members adhere to a minimum set of password requirements and complexity for access.
Vendor and Risk Management
  1. • Annual Risk Assessments
    • We perform risk assessments at least annual to identify any potential threats, including considerations for fraud
  2. • Vendor Risk Management
    • Vendor risk is determined and the appropriate vendor reviews are performed prior to authorizing a new vendor.
Contact Us

If you have any questions, comments or concerns or if you wish to report a potential security issue, please contact



Updated: 3-17-2023