Trust Center

Start your security review
View & download sensitive information
Ask for information
Search items

Overview

Welcome to Tempo's Trust Center. Our commitment to data privacy and security is embedded in every part of our business. Use this Trust Center to learn about our security posture and request access to our security documentation.

Compliance

CCPA Logo
CCPA
GDPR Logo
GDPR
HIPAA Logo
HIPAA
ISO 27001 Logo
ISO 27001
ISO 27001 SoA Logo
ISO 27001 SoA
ISO 27701 Logo
ISO 27701
PCI DSS Logo
PCI DSS
SOC 2 Logo
SOC 2
Start your security review
View & download sensitive information
Ask for information
Other Reports
Pentest Report
Security Whitepaper
SOC 2 Report
CCPA
GDPR
ISO 27001
ISO 27001 SoA
ISO 27701
SOC 2
CAIQ Lite
Cyber Insurance
Data Processing Agreement
Acceptable Use Policy
Access Control Policy
Asset Management Policy
Backup Policy
Business Continuity Plan (BCP)
Change Management Policy
Code of Conduct
Data Classification Policy
Data Protection Policy
Data Retention Policy
Disaster Recovery Plan (DRP)
Encryption Policy
Human Recourses Security Policy
Incident Response Plan
Information Security and Privacy Policy
Password Policy
Physical Security Policy
Responsible Disclosure Policy
Risk Assessment Policy
Software Development Life Cycle (SDLC) Policy
Vendor Management Policy
Vulnerability & Patch Management Policy

Risk Profile

Recovery Time Objective24 hours
Recovery Point Objective24 hours
HostingMajor Cloud Provider

Product Security

We pay great attention to enterprise features such as access control and single sign on. We are happy to provide more details about our enterprise features upon request.

Reports

Other Reports
Pentest Report
Security Whitepaper
View more

Self-Assessments

CAIQ Lite

Data Security

We follow industry best practices for data security. We are happy to provide more details about our data security practices upon request.

App Security

We take application security seriously and are putting together a program to monitor internal apps.

Data Privacy

Privacy Whitepaper

Access Control

Access is tightly monitored and controlled at our company. We are happy to provide more details about our access control practices upon request.

Infrastructure

We take great care to work with best-in-class infrastructure providers that provide secure computing and storage. We are happy to provide more details about our infrastructure upon request.

Endpoint Security

We follow industry best practices for endpoint security. We are happy to provide more details about our endpoint security practices upon request.

Network Security

We protect our corporate network against external & internal threats.

Corporate Security

We implement internal measures and practices to maintain a high standard of security.

Policies

Acceptable Use Policy
Access Control Policy
Asset Management Policy
View more

Security Grades

Qualys SSL Labs
Timesheets, Planner, Cost Tracker
A+
Structure, Structure.Gantt
A+
Roadmunk
A+
Security Headers
Roadmunk
A
Atlassian
A
Powered bySafeBase Logo