Miscellaneous > Terms & legals
Compliance
Tallyfy delivers SOC 2 Type 2 certified security with bank-level encryption, mandatory SSO options, and complete audit trails that meet regulatory requirements.
Tallyfy maintains SOC 2 Type 2 certification. An independent auditor examines our security controls over a three-month period.
- Assessment Period: Our most recent audit covered May 21, 2024, to August 21, 2024.
- Scope Coverage: The assessment tested Security controls based on AICPA Trust Services Criteria1 (the gold standard for SaaS security).
- Independent Auditor: Prescient Assurance LLC handled the audit - they’re tough, thorough, and don’t miss a thing.
- Compliance Status: We maintain continuous SOC 2 Type 2 compliance with annual renewals. Our next assessment wraps up August 21, 2025.
Tallyfy tracks all workflow actions automatically, creating a complete audit trail showing who did what, when they did it, and what changed.
- Complete Process Documentation: Every step gets timestamped with user and outcome
- Immutable Record Keeping: Once something happens, it’s locked in stone. Nobody can delete or modify audit records (not even admins)
- User Activity Logging: See exactly who clicked what button at 3:47 PM last Tuesday - it’s all there
- Export Capabilities: Generate audit reports for regulatory compliance
- Version Control: Track all template changes with author and reason
Financial Services Compliance:
- Asset management firms meeting SEC Rules 204-2 and 206(4)-7
- Banks complying with FINRA audit requirements
- Insurance companies tracking every claim decision and approval
Healthcare and Life Sciences:
- Pharma companies following FDA 21 CFR Part 112
- Clinical research teams meeting ICH E6(R3) standards for trial documentation
- Medical device manufacturers proving ISO 13485 compliance with every design change
- Healthcare IT maintaining those mandatory HIPAA audit logs
Manufacturing and Safety-Critical Industries:
- Auto manufacturers tracking every part change for IATF 16949:2016
- Aviation maintenance shops meeting FAA AC 145-9A compliance
- Nuclear facilities following 10 CFR 50 Appendix B
- Chemical plants meeting OSHA’s Process Safety Management requirements
Infrastructure and Utilities:
- Power companies dealing with NERC CIP cybersecurity audits
- Railroads documenting track inspections per 49 CFR 213
- Mining operations proving MSHA workplace examinations actually happened
These organizations require complete documentation showing “who did what, when.” For industry-specific details, see industry-specific workflow applications.
Tallyfy itself is not PCI-DSS certified as we don’t process payment card data directly. However, you can use Tallyfy in PCI-compliant environments by:
- Never storing card data in Tallyfy - Don’t enter credit card numbers, CVV codes, or other sensitive payment data in form fields
- Using tokenization - Store only tokenized references from your payment processor
- Implementing compensating controls - Use Tallyfy’s audit trails and access controls as part of your PCI compliance program
- Separating systems - Keep payment processing separate from workflow management
For organizations requiring PCI compliance, consult your QSA (Qualified Security Assessor) about using Tallyfy as part of your cardholder data environment.
Tallyfy implements enterprise security principles across the platform:
- Principle of Least Privilege: Users only access workflows relevant to their role
- Multi-Factor Authentication: Required second factor authentication for all logins
- Access Reviews: Annual permission audits for users, quarterly for admins
- Environment Segregation: Complete separation between development, test, and production environments
Tallyfy can restrict authentication exclusively to your SSO provider. SSO-only mode provides:
- All logins through your SSO provider only
- Email-password authentication disabled organization-wide
- Centralized user management through your identity provider
To enable SSO-only mode, contact Tallyfy support.
- Transport Layer Encryption: TLS 1.2+ encryption for all data in transit
- Data-at-Rest Protection: AES-256 encryption for stored data in AWS servers
- Tenant Isolation: Complete data separation between organizations
- Vulnerability Assessment: Annual penetration testing plus automated security scanning
- Change Control Procedures: All code changes require development, testing, review, and approval before production deployment
- Continuous Monitoring: AWS CloudWatch and GuardDuty provide 24/7 system monitoring with immediate alerting
- Incident Response Framework: Documented and tested security incident response procedures
- Vendor Security Assessment: Security vetting required for all vendors with regular reassessments
- Supply Chain Oversight: Regular review of AWS SOC 2 reports. According to industry research ↗[1], SOC 2 adoption increased 40% in 2024.
Tutorials > Workflow applications
Terms Legals > Tallyfy's privacy policy
Integrations > Authentication and SSO
- 2025 Tallyfy, Inc.
- Privacy Policy
- Terms of Use
- Report Issue
- Trademarks