top of page

AURIC Security & Compliance

At AURIC, security is a core pillar of our operations. See how we safeguard and protect your information. 

AURIC Security & Compliance

AURIC Security & Compliance

At AURIC, security is a core pillar of our operations. See how we safeguard and protect your information.

Our Committment to Security & Data Protection

At AURIC, security is a core pillar of our operations. We understand the importance of safeguarding executive communications, sensitive business data, and proprietary insights. Our approach to cybersecurity ensures that client data remains protected with industry-leading security standards, encryption protocols, and compliance measures.

At AURIC, security is a core pillar of our operations. We understand the importance of safeguarding executive communications, sensitive business data, and proprietary insights.

Our approach to cybersecurity ensures that client data remains protected with
industry-leading security standards, encryption protocols, and compliance measures.

robs-HOrhCnQsxnQ-unsplash_edited.jpg

AURIC Digital Intake System

AURIC ensures that all client data intake is handled securely through SOC 2 & SOC 3-compliant Dropbox storage while preventing sensitive information from being submitted through website forms.

Cybersecurity Protocols

AURIC employs a multi-layered security framework, including Norton 360 Deluxe protections, strict access controls, and encrypted backups, with additional enhancements planned through an MSP cybersecurity plan.

AI Data Governance & Compliance

AURIC maintains the highest standards of AI data security by enforcing strict privacy controls, ethical AI usage, secure data handling, and compliance with GDPR & CCPA where applicable.

Ongoing Security Enhancements

AURIC is committed to continuous security improvements, including MSP cybersecurity implementation, expanded data backups, and periodic security audits to ensure evolving compliance and risk mitigation.

AURIC Security Policy

AURIC Digital Intake System

To maintain the highest level of security, AURIC has a structured and secure digital intake system for handling client data:

  • Dropbox Business Plus (SOC 2, SOC 3): All client files and AURIC operational data are securely stored in Dropbox Business Plus, which features end-to-end encryption and 2-step verification to prevent unauthorized access.

  • Website Form Submissions: AURIC never requests sensitive information through web forms. All sensitive data is handled exclusively through Dropbox, ensuring a secure intake process.

Cybersecurity Protocols

AURIC employs a multi-layered security approach to protect our network, systems, and data:

  • Network & Systems Protection: We utilize Norton 360 Deluxe with the following security features:

    • Device Security (Antivirus & Malware Protection)

    • Privacy Monitor (Identity & Data Protection)

    • Dark Web Monitoring (Alerts for Compromised Credentials)

    • Secure VPN (Encrypted Internet Traffic)

    • Password Manager (Encrypted Credential Storage)

    • Two-Factor Authentication (2FA) Enabled for additional security

  • Data Backup & Redundancy: All files stored in Dropbox are regularly backed up to iCloud to ensure business continuity. Additional backup solutions will be integrated upon securing an MSP cybersecurity plan.

  • Strict Access Controls: AURIC enforces role-based access controls (RBAC) to ensure that only authorized personnel have access to sensitive data.

AI Data Governance & Compliance

AURIC integrates AI-powered analysis into executive communication assessments while maintaining the highest standards of privacy, security, and compliance.

  • Data Privacy & Protection:

    • No long-term storage of sensitive executive data.

    • AI analysis results are securely transmitted and never shared externally without consent.

    • Anonymization protocols ensure client confidentiality.

  • Data Retention & Deletion Policies:

    • Clients have full control over their data and may request deletion of AI-analyzed content at any time.

    • AURIC does not retain raw executive communication data beyond its analytical purpose.

  • AI System Security & Access Controls:

    • Multi-factor authentication (MFA) and strong encryption standards are applied to all AI-related data handling.

    • Strict access policies ensure that only authorized personnel interact with AI-analyzed data.

  • AI Usage Policy & Ethical AI Practices:

    • AURIC follows strict ethical AI usage guidelines to ensure transparency and compliance.

    • Our AI systems analyze data securely and are designed to align with privacy regulations, such as GDPR and CCPA where applicable.

  • Third-Party AI Tool Usage & Data Handling:

    • Otter.ai is used for transcription purposes only and does not retain client-sensitive insights beyond its intended function.

    • Client transcripts are stored securely in Dropbox Business Plus (SOC 2, SOC 3 compliant) after processing.

    • Transcripts are deleted from Otter.ai after processing to maintain confidentiality.

    • AURIC does not rely on third-party AI for long-term storage of executive communication data.

    • Clients may opt-out of AI-powered transcription upon request.

Ongoing Security Enhancements

AURIC is continuously strengthening its security framework. Future enhancements include:

  • MSP Cybersecurity Plan: A comprehensive managed security service will be implemented to enhance monitoring, threat detection, and response protocols.

  • Additional Backup Redundancies: We are evaluating expanded cloud and offline storage options to further improve data resilience.

  • Continuous Security Audits: AURIC will conduct periodic internal security audits to ensure compliance with evolving security standards.​

Downloadable Security Policy

A downloadable version of our Security Policy is available upon request. Please contact us to obtain a copy.

Have Security Questions?

For inquiries related to our security policies, compliance measures, or data protection practices, please contact us.

By dedicating resources to security and compliance, AURIC reinforces trust, credibility, and executive confidence in every engagement.

AURIC Security Policy

AURIC Digital Intake System

To maintain the highest level of security, AURIC has a structured and secure digital intake system for handling client data:

  • Dropbox Business Plus (SOC 2, SOC 3): All client files and AURIC operational data are securely stored in Dropbox Business Plus, which features end-to-end encryption and 2-step verification to prevent unauthorized access.

  • Website Form Submissions: AURIC never requests sensitive information through web forms. All sensitive data is handled exclusively through Dropbox, ensuring a secure intake process.

Cybersecurity Protocols

AURIC employs a multi-layered security approach to protect our network, systems, and data:

  • Network & Systems Protection: We utilize Norton 360 Deluxe with the following security features:

    • Privacy Monitor (Identity & Data Protection)

    • Dark Web Monitoring (Alerts for Compromised Credentials)

    • Secure VPN (Encrypted Internet Traffic)

    • Password Manager (Encrypted Credential Storage)

    • Two-Factor Authentication (2FA) Enabled for additional security

    • Device Security (Antivirus & Malware Protection)

  • Data Backup & Redundancy: All files stored in Dropbox are regularly backed up to iCloud to ensure business continuity. Additional backup solutions will be integrated upon securing an MSP cybersecurity plan.

  • Strict Access Controls: AURIC enforces role-based access controls (RBAC) to ensure that only authorized personnel have access to sensitive data.

AI Data Governance & Compliance

AURIC integrates AI-powered analysis into executive communication assessments while maintaining the highest standards of privacy, security, and compliance.

  • Data Privacy & Protection:

    • No long-term storage of sensitive executive data.

    • AI analysis results are securely transmitted and never shared externally without consent.

    • Anonymization protocols ensure client confidentiality.

  • AI Usage Policy & Ethical AI Practices:

    • AURIC follows strict ethical AI usage guidelines to ensure transparency and compliance.

    • Our AI systems analyze data securely and are designed to align with privacy regulations, such as GDPR and CCPA where applicable.

  • Third-Party AI Tool Usage & Data Handling:

    • Otter.ai is used for transcription purposes only and does not retain client-sensitive insights beyond its intended function.

    • Client transcripts are stored securely in Dropbox Business Plus (SOC 2, SOC 3 compliant) after processing.

    • Transcripts are deleted from Otter.ai after processing to maintain confidentiality.

    • AURIC does not rely on third-party AI for long-term storage of executive communication data.

    • Clients may opt-out of AI-powered transcription upon request.

  • Data Retention & Deletion Policies:

    • Clients have full control over their data and may request deletion of AI-analyzed content at any time.

    • AURIC does not retain raw executive communication data beyond its analytical purpose.

  • AI System Security & Access Controls:

    • Multi-factor authentication (MFA) and strong encryption standards are applied to all AI-related data handling.

    • Strict access policies ensure that only authorized personnel interact with AI-analyzed data.

Ongoing Security Enhancements

AURIC is continuously strengthening its security framework. Future enhancements include:

  • MSP Cybersecurity Plan: A comprehensive managed security service will be implemented to enhance monitoring, threat detection, and response protocols.

  • Additional Backup Redundancies: We are evaluating expanded cloud and offline storage options to further improve data resilience.

  • Continuous Security Audits: AURIC will conduct periodic internal security audits to ensure compliance with evolving security standards.

Downloadable Security Policy

A downloadable version of our Security Policy is available upon request. Please contact us to obtain a copy.

Have Security Questions?

For inquiries related to our security policies, compliance measures, or data protection practices, please contact us.

By dedicating resources to security and compliance, AURIC reinforces trust, credibility, and executive confidence in every engagement.

bottom of page