Skip to main content
Bota maintains SOC 2 Type II certification, demonstrating our commitment to security, availability, and confidentiality. This page describes our SOC 2 program and how it protects your data.

What is SOC 2?

SOC 2 (System and Organization Controls 2) is a security framework developed by the American Institute of CPAs (AICPA). It defines criteria for managing customer data based on five Trust Service Criteria:
CriteriaDescription
SecurityProtection against unauthorized access
AvailabilitySystem accessible as agreed
Processing IntegritySystem processing is complete, accurate, timely
ConfidentialityInformation designated as confidential is protected
PrivacyPersonal information is collected, used, retained, and disposed of appropriately

Bota’s SOC 2 Certification

Type II Certification

Bota has achieved SOC 2 Type II certification, which means:
  • An independent auditor has examined our controls over an extended period (typically 6-12 months)
  • Our controls are not just designed appropriately, but operate effectively over time
  • We undergo annual re-certification audits

Request SOC 2 Report

Contact [email protected] to request our SOC 2 Type II report under NDA

Trust Service Criteria Covered

Our SOC 2 report covers:
CriteriaStatus
SecurityCovered
AvailabilityCovered
ConfidentialityCovered

Security Controls

Access Management

ControlImplementation
Identity ManagementSSO with MFA required for all employees
Least PrivilegeRole-based access, quarterly access reviews
Privileged AccessJust-in-time access for production systems
OffboardingAutomated deprovisioning within 24 hours

Infrastructure Security

ControlImplementation
Cloud ProviderAWS with SOC 2, ISO 27001 certifications
Network SecurityVPC isolation, security groups, WAF
Vulnerability ManagementAutomated scanning, 30-day remediation SLA
Penetration TestingAnnual third-party pen tests

Data Protection

ControlImplementation
Encryption in TransitTLS 1.2+ for all connections
Encryption at RestAES-256 for all stored data
Key ManagementAWS KMS with automatic rotation
Backup EncryptionEncrypted backups with separate keys

Monitoring and Logging

ControlImplementation
Audit LoggingAll system and user actions logged
Log RetentionMinimum 1 year retention
SIEMCentralized security monitoring
Alerting24/7 security event monitoring

Incident Response

ControlImplementation
Incident PlanDocumented incident response procedures
Response TeamDedicated security incident response team
CommunicationCustomer notification within 24 hours
Post-IncidentRoot cause analysis and remediation

Availability Controls

Infrastructure Reliability

ControlImplementation
Multi-AZ DeploymentServices deployed across multiple availability zones
Auto-ScalingAutomatic capacity scaling based on demand
Load BalancingDistributed traffic across healthy instances
Database RedundancyMulti-AZ database with automatic failover

Disaster Recovery

ControlImplementation
Backup FrequencyDaily backups with point-in-time recovery
Backup TestingQuarterly restoration testing
RTO4-hour recovery time objective
RPO1-hour recovery point objective

Uptime

We target 99.9% uptime for the Bota API. Current status is available at status.bota.dev.

Confidentiality Controls

Data Classification

ClassificationDescriptionExamples
ConfidentialCustomer data requiring highest protectionAudio recordings, transcriptions, PHI
InternalBota operational dataSystem logs, metrics
PublicPublicly available informationDocumentation, marketing

Data Handling

ControlImplementation
Access LoggingAll access to confidential data logged
Data MinimizationOnly collect data necessary for service
Retention LimitsConfigurable retention with automatic deletion
Secure DisposalCryptographic erasure for deleted data

Third-Party Management

ControlImplementation
Vendor AssessmentSecurity review before onboarding vendors
Contractual ControlsData protection requirements in contracts
Annual ReviewsOngoing vendor security assessments

Compliance Program

Governance

  • Security Team: Dedicated security and compliance team
  • Security Officer: Designated CISO responsible for security program
  • Board Oversight: Regular security updates to leadership

Policies

We maintain comprehensive security policies covering:
  • Information Security
  • Access Control
  • Data Classification
  • Incident Response
  • Business Continuity
  • Acceptable Use
  • Vendor Management

Employee Security

ControlImplementation
Background ChecksPre-employment screening for all employees
Security TrainingAnnual security awareness training
Secure DevelopmentOWASP training for engineering team
Policy AcknowledgmentAnnual policy review and sign-off

Requesting Our SOC 2 Report

Our SOC 2 Type II report is available to customers and prospects under NDA.
1

Submit Request

Email [email protected] with your company name and use case
2

Sign NDA

We’ll send a mutual NDA for signature
3

Receive Report

Once the NDA is executed, we’ll share the full SOC 2 report
The report includes:
  • Independent auditor’s opinion
  • Description of Bota’s systems
  • Trust Service Criteria tested
  • Control activities and test results
  • Management’s assertion

Other Certifications

CertificationStatusDetails
SOC 2 Type IICertifiedAnnual audit
HIPAACompliantBAA available (Learn more)
GDPRCompliantEU data protection

Frequently Asked Questions

Type I examines controls at a point in time. Type II examines controls over a period (typically 6-12 months), providing assurance that controls operate effectively. Bota has Type II certification.
We undergo annual SOC 2 Type II audits. Our audit period typically runs from January to December, with reports issued in Q1 of the following year.
Yes, you may share our SOC 2 report with your external auditors under the terms of the NDA. Please do not share it publicly.
If our current report doesn’t cover your audit period, we can provide a bridge letter confirming no material changes since the last audit. Contact [email protected].
SOC 1 focuses on financial reporting controls. As Bota does not process financial transactions, SOC 2 is the appropriate standard for our services.

Contact

For SOC 2 and security questions: Email: [email protected] Subject: SOC 2 Inquiry
Last updated: January 15, 2025