Skip to content
    Language Switcher en
    Page 179178325944 Trust Centre | Unifonic//https://www.unifonic.com/en/legal/trust-centre
    Log in Book a demo

    ISO 27001 - Information Security Management System (ISMS)

    An internationally recognized standard for establishing, implementing, and improving an ISMS, ensuring sensitive information's confidentiality, integrity, and availability.


    ISO 27017 - Cloud Security

    ISO 27017 extends ISO 27001 to address cloud-specific security controls, guiding secure cloud service implementation and operation.

    ISO 27018 - Personally Identifiable Information (PII) Protection in Public Clouds

    ISO 27018 focuses on PII protection in public cloud environments, emphasizing privacy and security for personal data.

    CSA STAR Level 2 - Cloud Security Alliance (CSA) Security Trust Assurance and Risk (STAR) Level 2

    CSA STAR Level 2 certification highlights our firm commitment to maintaining the security and integrity of our cloud services. This certification not only sets us apart in the market but also enhances our reputation as a secure and trustworthy organization.

    SOC 2 Type I and II - Service Organization Control Reports

    Independent auditors issue SOC 2 reports and evaluate an organization's controls related to security, availability, processing integrity, confidentiality, and customer data privacy. SOC 2 Type I focuses on the design of controls, while SOC 2 Type II evaluates their effectiveness over time.

    Comprehensive Information Security Management System (ISMS) Coverage

    Spanning key areas such as Policies, Assets, Access, Cryptography, Operations, Communication, Physical Security, Business Continuity, HR, Product, Cloud Security, Supplier Relations, Vulnerability Management, and Incident Response.

    Security Governance

     A robust security governance framework aligns policies and procedures with industry best practices, establishing a solid foundation for data protection.

    Business Resilience

    Ensuring service continuity and data safety in the face of unexpected disruptions.

    DevSecOps

    Seamlessly integrating security throughout development, enabling proactive vulnerability identification and resolution.

    Threat and Risk Assessment

    Ongoing risk assessments proactively address security threats and vulnerabilities, reinforcing defence mechanisms against evolving risks.

    Cyber Defense

    Employing cutting-edge cybersecurity technologies and strategies to defend against evolving threats, keeping data safe from cyberattacks

    Transparent Policy Management

    Ensuring transparency and accountability, information security policies and standards undergo annual management team review and approval.

    Security Validation

    Continuous monitoring and at least annual penetration testing provide real-time incident detection and vulnerability identification for added security.

    Audit and Compliance

    Regular, thorough audits confirm adherence to industry standards and regulations, assuring peace of mind.

    Telecom regulators

    Telecom regulators issue policies to safeguard the public interest. Operators, service providers, and senders of business messages need to remain compliant. Unifonic is a licensed service provider with the CST in KSA and is highly familiar with the regulatory environment. We place a high focus on security and compliance with local regulations. 

    Learn More

    Anti-spam Regulations

    Regulators have anti-SPAM requirements in place to reduce SPAM messages. Here are the key requirements businesses need to be aware of when sending promotional messages and how we help.

    Learn More

    SMS Compliance

    When it comes to sending SMS messages, businesses need to comply with a number of requirements related to message classification, timing and more. Unifonic is a licensed service provider with CST in KSA.

    Learn More

    Voice Compliance

    The CST specifies regulations for curbing SPAM calls - including the specification of call types, frequency and more. Here are a few compliance points, and how we help.

    Learn More

    WhatsApp Compliance

    Marketers need to adhere to some key policies, strictly monitored by Meta, to ensure that the quality of the end customer's communication experience over WhatsApp remains high.

    Learn More

    Privacy Policy

    Our privacy statement outlines the details around how we protect the individual's privacy while handling information that can be directly or indirectly identified as ‘personal data’.

    Learn More

    Terms of Use

    In our commitment to complete transparency, we offer visibility into our service terms and conditions of use.

    Learn More

    Cookie Policy

    Please read this cookie policy carefully, as it contains important information on who we are and how we use cookies on our website. This policy should be read together with our Privacy Policy, which sets out how and why we collect, store, use and share personal information generally, as well as your rights in relation to your personal information and details of how to contact us and supervisory authorities if you have a complaint.

    Learn More

    FAQ

    Do you apply security measures such as access control, segregation of duties, audit logging, etc.?

    We implement a comprehensive set of security measures, including access control, segregation of duties, and audit logging, among others, to ensure the protection and integrity of our systems and data. These measures are integral to our security strategy and are regularly reviewed and updated to meet evolving security challenges and industry best practices.

    Is Unifonic "Fully compliant" with Saudi Arabia's national encryption standards (NCS: 1-2020)?

    Yes, Unifonic is fully compliant.

    Does your platform comply with the National Cyber Security Authority's controls for cloud hosting?

    Yes, our platform with the National Cyber Security Authority's controls for cloud hosting

    Is your platform protected by a SSL security certificate?

    Yes, our platform is protected by an SSL security certificate

    Does Unifonic have a physical office and legal representation in Saudi Arabia?

    Yes, Unifonic has a physical office and legal representation in Saudi Arabia. We have also implemented employee experience management projects in the kingdom and globally.

    Does Unifonic comply with the National Cyber Security Authority standards in all technical requirements at the level of platforms and infrastructure?

    Yes, Unifonic does comply, where applicable.

    Additional
    Resources

    A Short Guide to the SMS Compliance Landscape in KSA

    SMS Compliance KSA

    Learn More
    Navigating UAEs SMS Compliance Landscape A Guide for Businesses

    SMS Compliance UAE

    Learn More
    unifonic image74-100-1

    SAMA Compliance

    Learn More