Security & privacy at Collector Systems

The privacy and security of your data is our first priority.
Our customers enjoy the peace of mind that comes with our state-of-the-art security features.

Certifications & Frameworks

Infrastructure Security

Account & User Protection

Think of us as your data custodians.

Ensuring the security and protection of customer data is integral to Collector Systems. We prioritize a proactive approach to security rather than considering it as an afterthought. Our commitment to maintaining a secure environment underscores our dedication to safeguarding sensitive information and upholding the trust our customers place in us.

We have additional information listed below. If you still have any questions, please reach out to us via email.

When you access our site via the Transport Layer Security (TLS) protocol, your data is safeguarded both during transmission and at rest, utilizing robust SHA 256-bit encryption. This ensures that your information remains confidential and accessible solely to registered and authorized users.

Moreover, our cloud-based information management system backs up your data every 15 minutes, around the clock and throughout the year, in multiple geographic locations. In the event of any data loss, you can easily restore it in fifteen-minute increments.

Beyond the encryption and redundancy measures, our 24/7/365 monitored cloud solution offers comprehensive risk mitigation. We implement multiple layers of advanced application security, including a web application firewall (WAF) and real-time threat identification.

Collector Systems seamlessly blends the advantages of cutting-edge data architecture with industry-leading practices in information security design and management.

Two Factor Authentication

Our mandatory implementation of two-factor authentication enhances the security of the login process, offering an elevated level of protection for our client’s data within our secure server environment.


Collector Systems provides Single Sign-on (SSO) for organizations, further fortifying your security measures and aligning them with our already stringent standards.

User Permissions and Audit

Collector Systems offers extensive permissions controls, allowing user admins to precisely define granular access for all users. Account administrators can set and update the access level and permissions for every user on the account, with controls based on data type, editing ability, and access to reporting tools.

Each account designates an Account Contact, to make admin-level changes to the account such as user access and billing. Our team will help you set up user profiles and permissions during onboarding. We’re here to answer questions and assist with updates. All approved users (concurrent and occasional) will have their unique login credentials for security and auditing best practices.

The user can easily see when the database was accessed and what activity was performed on each record through the Subscription Activity tab. The Subscription Activity tab can be searched and sorted by username, record type, item name, and action. Creation and last modified timestamps are also present at the bottom of each object record.

Collector Systems proudly holds the SOC 2 Type II certification, obtained through an independent audit conducted in strict accordance with the American Institute of Certified Public Accountants (AICPA) standards. This certification independently verifies that our systems meet the highest benchmarks in security, availability, processing integrity, confidentiality, and privacy.

We are also actively pursuing our ISO 27001 certification audit, a globally recognized standard for establishing and maintaining information security across various domains, including asset management, asset control, cryptography, environmental security, operational security, communication security, systems development, human resources security, and compliance.
Collector Systems’ data centers are certified under the AICPA Trust Services Principles and Criteria. In addition to SOC 2 and ISO 27001, we adhere to other essential security frameworks and reports, such as PCI-DSS, SSAE16, SOC 1 and 3, and the Content Protection and Security Standard (CPS). As part of our commitment to security, we do not disclose the specifics of our reports or the architecture of our security systems as a precautionary measure.

Furthermore, Collector Systems’ data centers operate within the Privacy Shield framework, a mutual data security agreement established among the US Department of Commerce, European Commission, and Swiss Administration. For more in-depth information about our security practices, please feel free to contact us.

Understand how your data is collected and used. Our full policy is located here.

Our terms and conditions are located here.

Schedule a Demo

Test-drive the most powerful, secure and customizable collection management system today!