TRUST CENTER Security. Compliance. Privacy

22 years. Zero breaches.
Every interaction documented.

Etech operates in regulated industries including healthcare, insurance, financial services, and government programs. Our compliance posture is the result of a zero-trust architecture maintained across 7 sites, 3 countries, and 22 years of continuous operation.

22 years
Zero compliance breaches
7 sites
One security standard
2.5B
Interactions secured
0
Breaches. Ever.
Continuous monitoring. Live attestation portal.
22 years
Zero breaches
Zero-trust
All endpoints managed
VDI-secured
Regulated environments
PHI/PCI/PII
Redaction at capture
SOC 2 + ISO
Attested and aligned

OUR APPROACH

Security is not a department. It is the architecture.

Vishal Choudhary, Etech's AVP of Enterprise Technology and Security, joined the company in 2004 as a network administrator and has built the security infrastructure over 22 years. Every site operates under the same zero-trust framework. Every endpoint is managed. Every interaction is logged. The architecture prevents violations before they occur.

For security teams doing due diligence: the badge grid below links directly to our attestation portal at trust.etechgs.com, where you can access current SOC 2 reports, ISO 27001 documentation, penetration test summaries, and subprocessor lists. No NDA required for standard evidence packages.

CERTIFICATIONS AND ATTESTATIONS

Attested. Audited. Verified.

SOC 2 Type II

Attested

Annual third-party audit of security, availability, and confidentiality controls. Report available on trust.etechgs.com.

ISO 27001:2022

Aligned

Information security management system aligned to ISO 27001 framework. Documentation and controls mapped.

PCI DSS Level 1

Certified

Payment Card Industry Data Security Standard, highest level. All payment-adjacent workflows compliant.

HIPAA / HITECH

Compliant

Health Insurance Portability and Accountability Act. PHI handling controls, BAA execution, and breach notification procedures in place.

GDPR

Compliance Ready

General Data Protection Regulation. Data processing agreements, subject access request workflows, and EU data handling procedures documented.

CCPA / CPRA

Compliance Ready

California Consumer Privacy Act / California Privacy Rights Act. Consumer data rights workflows implemented.

TCPA

Compliant

Telephone Consumer Protection Act. 14.2M interactions processed with zero TCPA violations. Consent capture and DNC scrub at the stack level.

GLBA Safeguards

Compliant

Gramm-Leach-Bliley Act Safeguards Rule for financial services programs. Customer financial information protection controls active.

MBE

Certified

Minority Business Enterprise certified. Procurement diversity qualification.

View live attestation evidence, subprocessor lists, and penetration test summaries at trust.etechgs.com

Visit trust.etechgs.com

SECURITY CAPABILITIES

Zero-trust. Every site. Every endpoint.

Built and maintained by an in-house team of IT and security professionals across Microsoft, Linux, Cisco, and Fortinet platforms.

Network Security

Zero-trust architecture across all 8 sites. VPN segmentation, Fortinet firewall infrastructure, endpoint management, and real-time monitoring. Network traffic logged and analyzed continuously.

Data Redaction

PHI, PCI, and PII redacted at point of capture using NER-based models. No sensitive data stored from day zero on regulated programs. Redaction covers voice transcripts, screen recordings, and chat logs. Third-party attested.

VDI Ecosystem

Virtual Desktop Infrastructure for regulated programs. Agents access client systems through secured VDI sessions. No data touches local endpoints. Dealer and consumer queue separation by default on multi-brand programs.

Threat Monitoring

24/7 SOC monitoring. SIEM integration. Automated threat detection with defined incident response playbook and SLAs. Penetration testing conducted annually by independent third parties.

Endpoint Management

All devices managed centrally. USB ports disabled. Screen capture blocked. Bring-your-own-device prohibited on regulated programs. Patching automated across Microsoft, Linux, and Cisco platforms.

Access Controls

Role-based access with multi-factor authentication. Least-privilege model. Segregation of duties for system administration. Active Directory and SSO integration across all platforms. Access reviews quarterly.

INDUSTRY-SPECIFIC COMPLIANCE

Different industries. Same rigor.

Healthcare

HIPAA SOC 2 PCI HITRUST-ready

Insurance

SOC 2 ISO 27001 State DOI NAIC

Financial Services

GLBA PCI L1 SOC 2 CCPA

Telecom

TCPA CPNI SOC 2 PCI

Government

SOC 2 FOIA-aware Section 508 FISMA-adjacent

LIVE ATTESTATION EVIDENCE

Verify our compliance posture in real time.

Our trust portal at trust.etechgs.com provides live access to SOC 2 reports, ISO 27001 documentation, penetration test summaries, subprocessor lists, and current attestation status. No NDA required for standard evidence packages.

trust.etechgs.com Live attestation portal
Open in new tab

COMMON QUESTIONS

What security teams ask us.

Can we see your SOC 2 Type II report?

Yes. Available at trust.etechgs.com. No NDA required for the standard report.

Do you store PHI?

No. On healthcare programs, PHI is redacted at point of capture. No PHI is stored from day zero.

What is your incident response SLA?

Defined in our incident response playbook. Available upon request through trust.etechgs.com.

How do you handle subprocessor changes?

Subprocessor list is published at trust.etechgs.com and updated with advance notice per contractual requirements.

Talk to our security team.

We will walk you through the architecture, share evidence packages, and answer every question your compliance team has.