Verification Professional logo
Verification Professional
Security & Compliance

Security & Compliance

Designed with security-first controls to support verification workflows: controlled access, auditability, and employer-controlled delivery options that align with privacy and compliance needs.

Least privilege Audit logs Employer-controlled fields Secure delivery Dispute workflow support
Operating modelSelf-service portal + optional managed verifier handling.
Data deliverySecure SFTP feeds and/or record-by-record API (employer-controlled).
VisibilityRequest tracking and audit logs for access and verification activity.
ControlsLeast-privilege access patterns and operational safeguards.
AssuranceSOC 2 Type 2

Security posture

Core controls
  • Audit logging for verification activity and access events
  • Least-privilege access controls and operational safeguards
  • Secure delivery and tracking
Operational alignment
  • Repeatable workflows and clear request tracking
  • Employer-controlled field availability
  • Dispute workflow support for downstream correction processes

Data control

Record-by-record API
  • Reduces bulk movement where appropriate
  • Supports tighter field-level control
  • Better for near real-time verification needs
Secure SFTP file feeds
  • Employer-approved file formats and schedules
  • Predictable delivery and reconciliation
  • Works well when API changes aren’t feasible

Dispute workflow support

Employee dispute handling
  • Secure dispute intake and tracking
  • Clear ownership and follow-up workflow
  • Supports correction and verification re-issuance paths
FCRA compliance
Our dispute workflow is designed to support FCRA-compliant processes where applicable.
FCRA (FTC) START