
Trust Center


At O’Neil Software, we empower organizations to manage physical and digital records with security, efficiency, and confidence. Our cloud-based platform supports seamless tracking, retrieval, and secure destruction of information—reducing reliance on manual processes, outdated infrastructure, and siloed systems.
Trusted by records centers, archives, and enterprises worldwide, our solutions streamline operations and ensure compliance throughout the entire records lifecycle.
As a pioneer in records and information management, we recognize the critical responsibility of protecting sensitive data and enabling proper governance—including compliant destruction. Security, compliance, and ethical data practices are not features—they are embedded in our technology, operations, and culture.
We back this commitment with:
- SOC-2 and ISO 27001:2022 Certification: Validating our controls meet rigorous security, availability, and confidentiality standards.
- Multi-factor Authentication (MFA) and Single Sign-On (SSO): Strengthening identity access management.
- End-to-End Encryption: Protecting your data in transit and at rest.
- 24/7 Monitoring and Backups: Ensuring uptime, resilience, and recoverability.
- Granular Access Controls: Aligning system permissions with your organizational roles.
Our platform continues to evolve alongside regulatory standards and customer expectations—delivering ongoing improvements in data protection, governance, and secure operations. We are proud to serve an industry built on accountability, transparency, and trust.
Learn more about our Security & Compliance Practices
Frequently Asked Questions
All communication is encrypted in-transit using TLS 1.2 or greater.
Data stored in our infrastructure is protected at-rest using the 256-bit Advanced Encryption Standard (AES-256) with encryption keys stored within the Amazon Key Management Service.
Index
Index
Management Commitment To Information Security
Information Security Program
Information Security Policies
Information Security Organization
Information Systems Risk Management
Information Management
Personnel Security Management
Systems & Operation Management
Third Party Relationships
Access Controls
Security Incident Response
Frequently Asked Questions
All communication is encrypted in-transit using TLS 1.2 or greater.
Data stored in our infrastructure is protected at-rest using the 256-bit Advanced Encryption Standard (AES-256) with encryption keys stored within the Amazon Key Management Service.
Security risk assessment is an integral part of our software development life cycle. We use frameworks such as OWASP Top 10 as part of the risk review. We use both SAST and DAST vulnerability management tools to detect and manage code vulnerabilities. We also have a strong partnerships with third parties such as Rapid 7 and Inovo InfoSec who extensive application and network penetration test, as well as a private bug bounty program. This means that everything we deploy is continuously penetration tested by vetted and experienced security researchers. We use Stellar Cyber and Aikido to monitor for production infrastructure security issues, cloud security posture, vulnerabilities, and misconfigurations such as deviations from CIS Benchmarks.
All communication is encrypted in-transit using TLS 1.2+.
Data stored in our infrastructure is protected at-rest using the 256-bit Advanced Encryption Standard (AES-256) with encryption keys stored within the Amazon Key Management Service.
Encryption keys are managed via AWS Key Management Service (KMS). AWS KMS uses hardware security modules (HSMs) that have been validated under FIPS 140-2. The access to KMS is controlled via IAM Access controls and only enabled for selected employees. AWS KMS is designed so that no one, including AWS employees, can retrieve the plaintext KMS keys from the service.
We do not support customer-specific encryption keys.
We ensure that all access is based on the principle of least privilege. We use an identity provider with built-in threat intelligence feeds (i.e. dark web monitoring), strong password complexity requirements and a requirement for all employees to use a FIDO2 compliant authentication factor (biometric or security key). All employees are required to use a password manager, with a unique strong password and multi-factor authentication by default for all accounts. Access to our cloud infrastructure has restricted permissions using role based access controls, with access alerts and auditing in place.
For employee and contingent worker access to customer data and personal information we have implemented the following specific controls:
- Written policy for limiting employee, contingent worker, and contractor access to sensitive data, such as role-based access limitations and use of the principle of least privilege
- Periodic access reviews
- Access requests and explicit approvals for all access to sensitive data
- A requirement that all employees and contingent workers to execute NDA or other confidentiality agreements
- Periodic privacy and security training
- Immediate termination of access upon termination of employment
- Physical access restrictions, such as key card access and video monitoring
- Full audit logging of all access to our backend infrastructure and actions taken by staff




