Miscellaneous > Terms & legals
Compliance
Tallyfy® maintains enterprise-grade security infrastructure with comprehensive data protection protocols to safeguard your business processes and sensitive information.
Our platform meets rigorous compliance standards through industry-leading security frameworks. This section details our cybersecurity governance, compliance certifications, and data protection methodology.
Tallyfy® has successfully achieved SOC 2 Type 2 compliance certification through comprehensive third-party security assessments of our business process management platform.
- Assessment Period: This compliance evaluation encompassed May 21, 2024, to August 21, 2024.
- Scope Coverage: The assessment evaluated Security controls according to AICPA Trust Services Criteria frameworks.
- Independent Auditor: Prescient Assurance LLC conducted the comprehensive security compliance assessment.
- Compliance Status: Tallyfy® maintains continuous SOC 2 Type 2 adherence through systematic monitoring and annual certification renewals. The subsequent assessment cycle concludes August 21, 2025.
This SOC 2 Type 2 attestation validates that Tallyfy® security controls operate effectively and reliably throughout the entire evaluation period.
Tallyfy® provides comprehensive audit trail capabilities designed for highly regulated industries. Our platform automatically captures detailed records of every workflow action - including who performed each task, when it occurred, and what data changed - supporting compliance across multiple regulatory frameworks.
- Complete Process Documentation: Every workflow step is tracked with timestamps, user attribution, and outcome recording
- Immutable Record Keeping: Process execution records cannot be altered or deleted, ensuring audit trail integrity
- User Activity Logging: Detailed tracking of who performed each task, when actions occurred, and what changes were made
- Export Capabilities: Easy generation of compliance reports and audit evidence for regulatory examinations
- Version Control: Historical tracking of template changes and process modifications with rationale documentation
Tallyfy® serves organizations across sectors with mandatory audit trail requirements:
Financial Services Compliance:
- Asset management firms meeting SEC Rules 204-2 and 206(4)-7 requirements
- Banking institutions adhering to FINRA audit trail standards
- Insurance companies maintaining comprehensive claims documentation
Healthcare and Life Sciences:
- Pharmaceutical manufacturers following FDA 21 CFR Part 11 requirements
- Clinical research organizations meeting ICH E6(R3) standards
- Medical device companies adhering to ISO 13485 traceability requirements
- Healthcare IT systems maintaining HIPAA audit controls
Manufacturing and Safety-Critical Industries:
- Automotive manufacturers meeting IATF 16949:2016 traceability standards
- Aviation maintenance facilities following FAA AC 145-9A requirements
- Nuclear power operations adhering to 10 CFR 50 Appendix B standards
- Chemical process facilities meeting OSHA 29 CFR 1910.119 requirements
Infrastructure and Utilities:
- Electric utilities following NERC CIP cybersecurity requirements
- Railroad operations meeting 49 CFR 213 inspection standards
- Mining operations adhering to MSHA workplace examination requirements
Organizations in these sectors require workflow systems that demonstrate “who did what, when” for regulatory compliance, safety verification, and quality assurance. Tallyfy’s audit trails provide this critical documentation automatically. Learn more about industry-specific workflow applications.
Tallyfy® implements comprehensive cybersecurity measures aligned with industry-standard data protection frameworks.
Our security architecture encompasses:
- Principle of Least Privilege: Users receive access only to resources essential for their specific role functions.
- Multi-Factor Authentication: All authentication requires both unique credentials and secondary verification (such as mobile device confirmation) for enhanced security.
- Access Reviews: We conduct systematic privilege audits annually for standard users and quarterly for administrative access, ensuring permissions remain appropriate.
- Environment Segregation: Development, testing, and production systems maintain complete isolation. Production access requires explicit authorization and justification.
Organizations requiring enhanced authentication security can configure Tallyfy® for mandatory “SSO-only” access.
This enforcement mode provides:
- All authentication routes through your designated Single Sign-On provider - no alternative access methods.
- Complete disabling of traditional email-password authentication for all organizational accounts.
- Centralized user provisioning exclusively through your SSO identity provider, preventing direct email invitations.
This configuration ensures strict adherence to corporate identity governance policies while simplifying user management.
Organizations can enable mandatory SSO through Tallyfy® support channels.
- Transport Layer Encryption: All data transmission uses TLS 1.2 or higher encryption protocols, ensuring secure communication between your systems and Tallyfy® infrastructure.
- Data-at-Rest Protection: Your information stored in our AWS-hosted infrastructure receives comprehensive encryption using AES-256 algorithms.
- Tenant Isolation: Each organization’s data remains logically separated through unique identifiers, preventing any cross-organization data access.
- Vulnerability Assessment: We conduct regular security scanning and annual penetration testing with external specialists to identify and remediate potential vulnerabilities.
- Change Control Procedures: All infrastructure modifications follow a structured process - development, testing, review, and approval - before production deployment.
- Continuous Monitoring: Real-time system surveillance through AWS CloudWatch and GuardDuty detects performance anomalies, availability issues, and suspicious activities, triggering immediate alerts.
- Incident Response Framework: Our documented security incident procedures undergo regular testing and updates to ensure rapid, effective response to any security events.
- Vendor Security Assessment: All third-party vendors undergo comprehensive security evaluations before engagement, with periodic reassessments to maintain security standards.
- Supply Chain Oversight: Critical infrastructure partners, including AWS, undergo regular compliance reviews through SOC 2 assessments and security documentation evaluation. According to industry research ↗[1], SOC 2 adoption increased 40% in 2024, reflecting growing enterprise security requirements.
- How Tallyfy uses HTTP Strict Transport Security (HSTS)
- Understanding BIMI compliance for Tallyfy emails
Integrations > Authentication and SSO
Tutorials > Industry-specific workflow applications
- 2025 Tallyfy, Inc.
- Privacy Policy
- Terms of Use
- Report Issue
- Trademarks