Built secure
from the ground up
Trust is a
design principle
S2P Dynamics is committed to protecting customer data and maintaining strong information security practices. Our platform is being built in alignment with SOC 2 security principles — and as we move toward full commercial deployment, we plan to undergo a formal SOC 2 audit to validate and certify our compliance.
Our goal is to provide customers with a secure, trustworthy environment from day one — not as an afterthought, but as a core design principle woven into every layer of our platform.
The five Trust
Service Criteria
we build for
Security
The system is protected against unauthorized access, both physical and logical. Controls include access management, encryption, monitoring, and incident response procedures designed to safeguard data at every layer of the platform.
Availability
The system is available for operation and use as committed or agreed. We design our infrastructure for reliability and uptime, ensuring researchers can access the platform when they need it most.
Processing Integrity
System processing is complete, valid, accurate, timely, and authorized. Every prediction run through our platform is processed with integrity — inputs are validated, outputs are traceable, and all operations are logged.
Confidentiality
Information designated as confidential is protected as committed or agreed. Customer molecular data, research inputs, and proprietary information are handled with strict confidentiality controls throughout our infrastructure.
Privacy
Personal information is collected, used, retained, disclosed, and disposed of in accordance with our privacy commitments. We collect only what is necessary and are fully transparent about how it is used.
Our path to
SOC 2 certification
Security by Design
Our platform architecture incorporates security controls from the earliest stages of development — not retrofitted after the fact. Access controls, encryption standards, and audit logging are fundamental layers of the system, not add-ons.
Formal SOC 2 Type II Audit
As we move toward full commercial deployment, we plan to undergo a SOC 2 Type II audit conducted by an independent third-party auditor. This audit examines our security controls over an extended observation period, producing a report customers and partners can rely on as objective evidence of our practices.
Continuous Improvement
We view SOC 2 not as a checkbox, but as a living framework that keeps our security posture rigorous and continuously improving. As our platform evolves, our security practices evolve with it — evaluated, tested, and updated on an ongoing basis.
Have questions about our practices?
Contact Us