Skip to main content

Labster Trust Center

Serves as your central hub for understanding how Labster protects your data and maintains the highest standards of security and compliance.

Updated this week

Accessing the Trust Center

  1. Navigate to the Labster Trust Center URL

  2. Review publicly available information

  3. Click "Get access" to request sensitive documentation

Security Review Process

To view and download sensitive security information:

  1. Click the "Get access" button in the top right corner

  2. Complete the security review form

  3. Our security team will review your request

  4. Upon approval, you'll receive access to download sensitive documents

Key Features

1. Compliance & Certifications

Labster maintains the following certifications and compliance standards:

  • SOC 2 Type 2: Demonstrates our commitment to security, availability, processing integrity, confidentiality, and privacy

  • TX-RAMP: Texas Risk and Authorization Management Program certification

  • VPAT: Voluntary Product Accessibility Template for accessibility compliance

2. Available Documents

Public Documents

  • VPAT (Accessibility compliance)

  • Service Level Agreement

Private Documents (Requires Access)

  • SOC 2 Report

  • SOC 2 Type 2 Bridge Letter

  • Pentest Report

  • Risk Assessment

  • HECVAT Full

3. Risk Profile

Our Risk Profile provides transparency about:

  • Data Access Level: Public

  • Impact Level: Low

  • Recovery Time Objective: 24-48 hours

4. Security & Privacy Categories

Data Security & Privacy

  • Data Backups

  • Data Protection

  • Data Retention

Access Control

  • Access Control Policy

  • Asset Management

  • IT Acceptable Use

Incident Response

  • Business Continuity Plan

  • Disaster Recovery Plan

  • Incident Response Plan

Reports & Assessments

  • Pentest Report

  • SOC 2 Report

  • SOC 2 Type 2 Bridge Letter

Self-Assessments

  • HECVAT Full

  • Risk Assessment

App Security

  • Software Development Lifecycle

  • Vulnerability & Patch Management

Legal

  • Subprocessors

  • Cyber Insurance

  • Data Subject Requests

5. Subprocessor List

We maintain full transparency about our third-party vendors. Our subprocessors include:
โ€‹

Frequently Asked Questions

How do I request access to sensitive documents?

  • Click the "Get access" button and complete our security review form. Our team will review your request and grant access upon approval.

How long does the access approval process take?

  • Typically, access requests are reviewed within 1-2 business days.

Can I bulk download all documents?

  • Yes, once you have access, you can use the "Bulk download" button to download all available documents at once.

How often are the documents updated?

  • We update our security documentation regularly. SOC 2 reports are updated annually, while other documents are updated as needed.

Who can I contact for questions about specific security practices?

If you have questions not answered in the Trust Center, please contact our support team or your account manager.

Additional Resources

Contact Us

For additional security-related questions or concerns, please contact:

Did this answer your question?