<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=4371236&amp;fmt=gif">
Skip to content

Security & Compliance

Overview

Information security is at the core of everything we build at Semsee. As a company serving independent insurance agencies and partners across the U.S., we understand the importance of protecting your data and maintaining your trust. Our commitment to information security drives how we design, build, and manage our platform—from infrastructure to daily operations.

We implement industry-leading security measures to ensure that data is protected, access is restricted to authorized users, and sensitive information is handled securely throughout every interaction with our platform. Keeping your data safe isn’t just our responsibility—it’s the foundation of your experience with Semsee.

We’re proud to share that Semsee has successfully completed its SOC 2 Type II attestation, reinforcing our commitment to security, availability, and confidentiality.

SOC Badge

 


SOC 2 Type II Attestation

The SOC 2 audit is one the highest recognized standards of information security compliance in the world. It was developed by the American Institute of CPAs (AICPA) to allow a third-party auditor to validate a service company’s internal controls with respect to information security. The SOC 2 report is the auditor’s opinion on how an organization’s security controls meet the SOC 2 criteria.

A third-party auditor - the Johanson Group, reviewed our internal controls including policies, procedures and infrastructure regarding data security, firewall configurations, change management, logical access, backup and disaster recovery, security incident response and other critical areas of our business.

To request our SOC 2 audit, please email your request to security@semsee.com and we will begin by sending you an NDA to sign.


Compliance

Semsee is committed to supporting our partners’ compliance with key regulatory frameworks like GDPR, CCPA, and other data privacy laws that affect how data is stored, shared, and processed. While we are not directly subject to all regulations, we implement best practices that promote safe handling of information and provide transparency into how data flows through our systems.

Features that support compliance include:

  • Strict role-based access controls

  • Daily system backups and encrypted data at rest and in transit

  • Secure data deletion upon client request

  • Regular vulnerability scanning and third-party assessments

For custom compliance needs, please reach out to security@semsee.com.


Security Best Practices

Our security program includes ongoing assessments and investments in infrastructure and engineering to proactively mitigate risk. Here’s what we prioritize:

  • Secure development processes with code reviews and automated testing

  • Protection against OWASP Top 10 vulnerabilities

  • Ongoing security training for internal teams

  • 24/7 monitoring and rapid incident response

  • Continuous updates to our security protocols following any incident

We also maintain a vulnerability disclosure program and welcome responsible reporting of potential security issues. If you’ve identified a vulnerability, please email security@semsee.com for disclosure guidelines.