Certifications & attestations
Formal attestations the firm holds or is pursuing. Letters of certification, audit reports, and gap-assessment summaries are available under NDA on request.
We help our customers operate audit-grade platforms. The same discipline applies to the firm. This page is the public-facing summary of how CompTech Lab itself handles information security, customer data, and compliance — the source of truth your procurement and security functions will reference.
Formal attestations the firm holds or is pursuing. Letters of certification, audit reports, and gap-assessment summaries are available under NDA on request.
| Standard | Scope | Status | Notes |
|---|---|---|---|
| ISO/IEC 27001 | Information security management | In progress | Targeted certification for the firm's own information-security posture. |
| ISO/IEC 27701 | Privacy information management | Planned | Privacy-management extension of ISO 27001. |
| SOC 2 Type I | Trust services criteria — readiness | Planned | Initial point-in-time attestation. |
| SOC 2 Type II | Trust services criteria — operational | Planned | Operating-effectiveness attestation over a defined period. |
| ISO/IEC 42001 | AI management system | Planned | AI management certification for our AI-practice operating model. |
The firm operates an internal information-security management programme aligned to ISO 27001 controls. Key elements:
We process customer data under three explicit principles:
A current list of sub-processors that may process customer data during engagements is available under NDA. The list includes the cloud, identity, and engineering-tool platforms we operate the practice on. We notify customers in advance of material additions.
We accommodate customer data-residency requirements (regional, national, or air-gapped) as part of engagement scoping. For regulated customers with strict sovereignty requirements, we operate inside the customer's environment with no customer data leaving the boundary.
If you believe you have found a vulnerability in our website or in any service operated under our control, please contact security@comptech-lab.com. We will acknowledge receipt within two business days, share remediation timelines, and credit reporters with their consent.
For enterprise procurement and vendor-security reviews, we maintain a standard response pack covering controls, sub-processors, business-continuity, insurance, and contractual terms. To request access, contact trust@comptech-lab.com.