- Cloud security controls
- Encryption in transit and at rest
- Network segmentation
COBOLpro
Get in touch
- Security: security@cobolpro.com
- Legal: legal@cobolpro.com
- Privacy: privacy@cobolpro.com
Policies and documentation
Reporting adverse impacts
If you are aware of an adverse impact related to COBOLpro systems or AI-supported analysis, contact legal@cobolpro.com. Reports are reviewed by our legal and security owners and routed for assessment, remediation, and customer communication when required.
Compliance
GDPR
HIPAA
SOC 2 Type II
ISO/IEC 27001
- VRVendor risk review
- AIAI governance
- Information security management scope
- Personnel security review
- Supplier risk management
- Secure development life cycle
- Secure coding
- Security testing before release
- Business continuity readiness
- Information backup
- Incident response procedures
- Data classification
- Customer-approved support access
- Retention and deletion governance
Resources
View allCompliance Certificates
Audit Reports
Technical Documentation
Penetration Tests
Disaster Recovery Test
AI governance
Policies
Other resources
FAQ
View allWhat data encryption standards do you use?
Customer materials are transferred over encrypted channels and stored using encrypted storage. Key ownership, residency, and deployment constraints are scoped during the security review.
Who has access to our data?
Access is limited by role, project, purpose, and approved support window. Customer source code and artifacts are handled as confidential engagement materials with reviewable access paths.
Do the AI models in use retain or learn from customer data?
No. Customer source code and confidential materials are not used to train foundation models. Materials are used only to deliver the approved engagement scope.
Do you conduct penetration testing on a regular basis?
Security testing and third-party review evidence can be shared under NDA with qualified customers and procurement teams as part of the controlled trust review process.
