Upstream Works

Security and Compliance

Enterprise-Class Security

Upstream Works helps to protect your contact center and customer data with the highest levels of security across applications, systems, assets, and infrastructure. We use best-practice tools, procedures and controls to maximize security, both on-premise and in the cloud.

We regularly engage with third-party security experts for penetration tests to evaluate the security of our system. Businesses around the globe rely on Upstream Works to protect their contact center data.

Cloud icon

AWS FTR

Upstream Works cloud solutions follow the AWS FTR framework to protect data and systems.

hippa-3-2024

HIPAA Compliant

Upstream Works desktop cloud solutions are HIPAA compliant to protect patient data.

FedRAMP-Icon-Nov2023

Prepared for FedRAMP

Upstream Works products are prepared for FedRAMP and meet DISA and STIG compliance requirements.

SOC logo

SOC 2 Certified

Upstream Works solutions are SOC 2 Type II compliant providing enterprise-level security and protection.

Starts icon

GDPR

Upstream Works solutions allow users to follow General Data Protection Regulation (GDPR) principles.

Lock icon

Penetration Testing

Penetration testing is based on OWASP and NIST SP 800-115 security testing.

Upstream Works SOC 3 Compliance Report

The System and Organization Controls (SOC) reports are independent third-party reports that demonstrate how Upstream Works achieves key compliance controls and objectives. The Upstream Works SOC 3 Security and Availability Report provides a high-level overview and summary of the key information presented in the SOC 2 report.

Agent discussing

Upstream Works Data Management and Security

Upstream Works provides omnichannel contact center software that is designed to provide an optimal customer experience. It does not store customer profile records itself. However, it does maintain interaction records which identify customers in terms of pertinent information that enables great CX, including channel of contact, reason for the contact, and other information the contact center deems to be useful. The desktop and routing platform can also track repeat contact behaviors and help identify potential fraud.