Eventual Treasury logo
Live monitoring by Delve
Eventual Treasury Compliance Report
Eventual Treasury is in compliance with security best practices, has implemented and is monitoring comprehensive controls, and maintains policies to outline its security procedures.

Compliance Certifications

We maintain the highest industry standards and regularly undergo rigorous third-party audits to ensure compliance.

SOC 2 Type IICompliant

SOC 2 Type II

Audited controls for security, availability, and confidentiality trust service principles with an observation period.

Last audit: January 2026
SOC 2 Type ICompliant

SOC 2 Type I

Audited controls for security, availability, and confidentiality trust service principles.

HIPAACompliant

HIPAA

US regulation that safeguards medical data privacy and security. Essential for healthcare providers, insurers, and related tech.

Continuously monitored

Resource Library

Access our security documentation, policies, and compliance reports.

PDF

SOC 2 Type I

Compliance report

PDF

SOC 2 Type II

Compliance report

PDF

HIPAA Internal Privacy Policy

HIPAA Internal Privacy Policy document

Updated: January 2026
PDF

Personnel Security Policy

Personnel Security Policy document

Updated: January 2026
PDF

Acceptable Use Policy

Acceptable Use Policy document

Updated: January 2026
PDF

Information Security Policy

Information Security Policy document

Updated: January 2026

Security Controls

Our comprehensive security program includes controls across multiple domains to protect your data.

Infrastructure

LIVE
Access Control Procedures
Completed
Access Restricted to Modify Infrastructure
Completed
Access Review of Infrastructure
Completed

Data Privacy & Security

LIVE
Backup and Recovery Policy
Completed
Data Loss Prevention Tool
Completed
Database Backups
Completed

Risk & Incident Management

LIVE
Alerts and Remediation
Completed
Breach Notification Communication
Completed
e​Phi Risk Assessment Report
Completed

Compliance & Governance

LIVE
Whistleblower Policy
Completed

Other

LIVE
Antivirus and Malware Configurations
Completed
Application Outages
Completed
Asset Disposal Procedure
Completed

Subprocessors Directory

We carefully select and monitor all third-party services that process data on our behalf.

Slack logo

Slack

Business Apps & Productivity

Google Workspace logo

Google Workspace

Business Apps & Productivity

GitHub logo

GitHub

Code & Build Security

AWS logo

AWS

Cloud Infrastructure & Platform Services

Frequently Asked Questions

Find answers to common questions about our security and compliance practices.

Our Security Commitment

Security Shield

At Eventual Treasury, security isn't just a feature—it's foundational to everything we build. Our security-first mindset drives our development processes, infrastructure decisions, and organizational policies. We treat the data entrusted to us—whether from our customers, their end users, or anyone who interacts with our organization—with the utmost care and responsibility. Security is embedded in our DNA, enabling us to deliver innovative solutions without compromising on protection.