Skip to content
Language Switcher en
Page 179178325944 Trust Centre | Unifonic//https://www.unifonic.com/en/legal/trust-centre
Log in Book a demo

ISO 27001 - Information Security Management System (ISMS)

An internationally recognized standard for establishing, implementing, and improving an ISMS, ensuring sensitive information's confidentiality, integrity, and availability.


ISO 27017 - Cloud Security

ISO 27017 extends ISO 27001 to address cloud-specific security controls, guiding secure cloud service implementation and operation.

ISO 27018 - Personally Identifiable Information (PII) Protection in Public Clouds

ISO 27018 focuses on PII protection in public cloud environments, emphasizing privacy and security for personal data.

CSA STAR Level 2 - Cloud Security Alliance (CSA) Security Trust Assurance and Risk (STAR) Level 2

CSA STAR Level 2 certification highlights our firm commitment to maintaining the security and integrity of our cloud services. This certification not only sets us apart in the market but also enhances our reputation as a secure and trustworthy organization.

SOC 2 Type I and II - Service Organization Control Reports

Independent auditors issue SOC 2 reports and evaluate an organization's controls related to security, availability, processing integrity, confidentiality, and customer data privacy. SOC 2 Type I focuses on the design of controls, while SOC 2 Type II evaluates their effectiveness over time.

Comprehensive Information Security Management System (ISMS) Coverage

Spanning key areas such as Policies, Assets, Access, Cryptography, Operations, Communication, Physical Security, Business Continuity, HR, Product, Cloud Security, Supplier Relations, Vulnerability Management, and Incident Response.

Security Governance

 A robust security governance framework aligns policies and procedures with industry best practices, establishing a solid foundation for data protection.

Business Resilience

Ensuring service continuity and data safety in the face of unexpected disruptions.

DevSecOps

Seamlessly integrating security throughout development, enabling proactive vulnerability identification and resolution.

Threat and Risk Assessment

Ongoing risk assessments proactively address security threats and vulnerabilities, reinforcing defence mechanisms against evolving risks.

Cyber Defense

Employing cutting-edge cybersecurity technologies and strategies to defend against evolving threats, keeping data safe from cyberattacks

Transparent Policy Management

Ensuring transparency and accountability, information security policies and standards undergo annual management team review and approval.

Security Validation

Continuous monitoring and at least annual penetration testing provide real-time incident detection and vulnerability identification for added security.

Audit and Compliance

Regular, thorough audits confirm adherence to industry standards and regulations, assuring peace of mind.

Telecom regulators

Telecom regulators issue policies to safeguard the public interest. Operators, service providers, and senders of business messages need to remain compliant. Unifonic is a licensed service provider with the CST in KSA and is highly familiar with the regulatory environment. We place a high focus on security and compliance with local regulations. 

Learn More

Anti-spam Regulations

Regulators have anti-SPAM requirements in place to reduce SPAM messages. Here are the key requirements businesses need to be aware of when sending promotional messages and how we help.

Learn More

SMS Compliance

When it comes to sending SMS messages, businesses need to comply with a number of requirements related to message classification, timing and more. Unifonic is a licensed service provider with CST in KSA.

Learn More

Voice Compliance

The CST specifies regulations for curbing SPAM calls - including the specification of call types, frequency and more. Here are a few compliance points, and how we help.

Learn More

WhatsApp Compliance

Marketers need to adhere to some key policies, strictly monitored by Meta, to ensure that the quality of the end customer's communication experience over WhatsApp remains high.

Learn More

Privacy Policy

Our privacy statement outlines the details around how we protect the individual's privacy while handling information that can be directly or indirectly identified as ‘personal data’.

Learn More

Terms of Use

In our commitment to complete transparency, we offer visibility into our service terms and conditions of use.

Learn More

Cookie Policy

Please read this cookie policy carefully, as it contains important information on who we are and how we use cookies on our website. This policy should be read together with our Privacy Policy, which sets out how and why we collect, store, use and share personal information generally, as well as your rights in relation to your personal information and details of how to contact us and supervisory authorities if you have a complaint.

Learn More

FAQ

Do you apply security measures such as access control, segregation of duties, audit logging, etc.?

We implement a comprehensive set of security measures, including access control, segregation of duties, and audit logging, among others, to ensure the protection and integrity of our systems and data. These measures are integral to our security strategy and are regularly reviewed and updated to meet evolving security challenges and industry best practices.

Is Unifonic "Fully compliant" with Saudi Arabia's national encryption standards (NCS: 1-2020)?

Yes, Unifonic is fully compliant.

Does your platform comply with the National Cyber Security Authority's controls for cloud hosting?

Yes, our platform with the National Cyber Security Authority's controls for cloud hosting

Is your platform protected by a SSL security certificate?

Yes, our platform is protected by an SSL security certificate

Does Unifonic have a physical office and legal representation in Saudi Arabia?

Yes, Unifonic has a physical office and legal representation in Saudi Arabia. We have also implemented employee experience management projects in the kingdom and globally.

Does Unifonic comply with the General Authority for Cyber Security standards in all technical requirements at the level of platforms and infrastructure?

Yes, Unifonic does comply, where applicable.

Additional
Resources

A Short Guide to the SMS Compliance Landscape in KSA

SMS Compliance KSA

Learn More
Navigating UAEs SMS Compliance Landscape A Guide for Businesses

SMS Compliance UAE

Learn More
unifonic image74-100-1

SAMA Compliance

Learn More