Skip to main content
Skip to navigationSkip to main content
COBOLproCOBOLPROTrust Center

COBOLpro

Get in touch

Policies and documentation

Reporting adverse impacts

If you are aware of an adverse impact related to COBOLpro systems or AI-supported analysis, contact legal@cobolpro.com. Reports are reviewed by our legal and security owners and routed for assessment, remediation, and customer communication when required.

Compliance

  • GDPR
  • HIPAA
  • SOC 2 Type II
  • ISO/IEC 27001
  • VRVendor risk review
  • AIAI governance

Controls

Updated recentlyView all
  • Cloud security controls
  • Encryption in transit and at rest
  • Network segmentation
  • Information security management scope
  • Personnel security review
  • Supplier risk management
  • Secure development life cycle
  • Secure coding
  • Security testing before release
  • Business continuity readiness
  • Information backup
  • Incident response procedures
  • Data classification
  • Customer-approved support access
  • Retention and deletion governance

Resources

View all

Audit Reports

Technical Documentation

Penetration Tests

Disaster Recovery Test

AI governance

Policies

Subprocessor list

Other resources

What data encryption standards do you use?

Customer materials are transferred over encrypted channels and stored using encrypted storage. Key ownership, residency, and deployment constraints are scoped during the security review.

Who has access to our data?

Access is limited by role, project, purpose, and approved support window. Customer source code and artifacts are handled as confidential engagement materials with reviewable access paths.

Do the AI models in use retain or learn from customer data?

No. Customer source code and confidential materials are not used to train foundation models. Materials are used only to deliver the approved engagement scope.

Do you conduct penetration testing on a regular basis?

Security testing and third-party review evidence can be shared under NDA with qualified customers and procurement teams as part of the controlled trust review process.