SECURITY AND TRUST

Security is More Than Just a Task

It’s in the DNA of every employee, every product, and built into our culture. SoundThinking has defined how its systems and applications can be protected from new and emerging threats.

Get in Touch
Book a Demo

Certifications & Compliance Frameworks

It’s in the DNA of every employee, every product, and built into our culture. SoundThinking has defined how its systems and applications can be protected from new and emerging threats.

AICPA
CIS
CCPA
HIPAA
CJIS
TXRAMP
NIST
SOC
NIST-COMP
US-SEC
SHA
CIRCLE
HECVAT

Cybersecurity Framework

Securing our hardware, software, data and AI use.

All US Customer solutions are hosted solely on infrastructure within in the United States. We do not directly use any Chinese company as a subprocessor, and to our knowledge none of our subprocessors do either. 

We assign infrastructure access to team members on a least-privilege basis. We enforce multi-factor authentication for AWS. We restrict access to resources using both network-level controls and secrets.

Cybersecurity Framework

SoundThinking Security Policies

Robust and Comprehensive Security Program

SoundThinking Security Policies

SoundThinking
AppSec Program

We integrate security into every stage of the Software Development Lifecycle, starting with secure design principals and validating security during the test and development cycle, prior to release.


Our commitment to transparency and trust means we embrace responsible disclosure and are transparent about material findings and evolving threats.

Key Security Practices

SoundThinking AppSec Program

Do you have any Questions?

Get in Touch

Secure Hosting Platform

GovCloud provides specialized cloud computing environments designed to meet the stringent security, compliance, and operational requirements specific to government agencies.

Secure Hosting Platform

Artificial Intelligence Security

Artificial Intelligence (AI) and Large Language Models (LLM) are at the heart of SoundThinking’s technology having used in Machine Learning in ShotSpotter since the early 2000s, but it’s always deployed responsibly and ethically.

AI-Driven Threat Detection

Our AI-integrated security tools quickly identify, alert and/or neutralize potential threats, from phishing to ransomware.

Human Oversight and Accountability

AI outputs are always subject to human review, ensuring that decision-making aligns with ethical standards and regulatory compliance.

Privacy by Design

All personal data processed by AI systems is anonymized and protected, adhering to a zero-trust framework that limits access to only what is essential.

Artificial Intelligence Security

Compliance & Attestations

Together with Partners for Greater Public Safety

You can trust SoundThinking to handle your data securely. Our dedicated Compliance Program details our comprehensive security controls and our diligent adherence to all relevant Cybersecurity Laws, Regulations, Attestations, and Frameworks that are important to our customers.

SOC 2

SOC 2 is a cybersecurity compliance framework, developed by the American Institute of Certified Public Accountants (AICPA), designed to ensure service organizations securely manage customer data and systems. SoundThinking is aligned to Security, Availability, and Confidentiality Trust Services Categories.

HIPAA

SoundThinking provides assurances that we will comply with requirements for HIPAA Privacy, Security, and the HITECH Act.

SafePointe is the only SoundThinking Application in scope and undergoes HIPAA audits by a trusted third party auditor. For a copy of this attestation report, please contact a sales representative.

CCPA / CPRA / PRIVACY

The California Consumer Privacy Act (CCPA) and the California Privacy Rights Act (CPRA) are laws that protect the personal information of California residents. The CPRA expanded on the CCPA and added new rights for consumers. Under the CCPA, consumers may request information about the personally identifiable information (PII), as well as the categories of PII a business collects and sells. The CPRA expands this right to include the data a business shares. It also expands the timeframe for which a consumer can request that information.

For more info: Privacy Page

CJIS

The CSP (CJIS Security Policy) sets minimum security requirements for any authorized organization that wishes to access CJIS, or that processes and maintains criminal justice information (CJI).

Our products “CrimeTracer” and “CaseBuilder” endeavor to ensure that they remain compliant within the evolving CJIS security standard by the sanctionable and auditable dates within the policy.

TX-RAMP

TX-RAMP is a standardized framework for assessing and monitoring the security and risk of cloud-based services used by Texas state agencies, ensuring compliance with state cybersecurity requirements.

NIST SP 800-53

Adoption of policies, procedures, and security controls necessary to identify, protect, detect, respond, and recover from cybersecurity events. SoundThinking has its security program rooted in the NIST principles of SP 800-53 around safeguarding measures for all types of computing platforms, including general purpose computing systems, cyber-physical systems, cloud-based systems, mobile devices, Internet of Things (IoT) devices, and communications systems, among others. The objective is to make the information systems we depend on more penetration-resistant, limit the damage from attacks when they occur, make systems cyber-resilient and survivable and protect our data.

See All Certifications
Features

Robust Security & Privacy at SoundThinking

NextGen Security Tools

Automated Threat Detection

Our security tools quickly identify and neutralize potential threats, from phishing to ransomware and alert staff if further action is needed.

Encryption Standards

SoundThinking ensures its GovCloud-hosted CrimeTracer and CaseBuilder applications meet CJIS requirements via FIPS 140-2/3 standards. All data is secured using AES-256 (FIPS 197 compliant) at rest and TLS 1.2+ in transit.

Advanced Intrusion Detection

Edge systems include firewalls, anomaly detection and heuristic analysis to monitor for suspicious activity in real-time.

Multi-factor Authentication

SoundThinking supports two-factor authentication (2FA) in order to provide an additional layer of security to your account.

Data Retention Controls

SafePointe maintains HIPAA compliance to store the required records for a period of 6 years from the date of creation. Access to these records is based on least-privilege and need-to-know.

Internal Audits

The IT & InfoSec teams performs periodic audits to ensure ongoing compliance with our internal and external requirements and compliance audits.

Dedicated InfoSec Team

Security and IT Team maintain industry-best certifications including CISSP, and AWS Security Certifications among others.

Industry Partners

SoundThinking maintains partnerships with key vendors including but not limited to: AT&T Cybersecurity, Level Blue, CJIS Online, Qualys, Secure CyberDefence, & Palo Alto.

Incident Response Detection, Logging and Prevention

Through rigorous monitoring, logging and remediation, we have avoided all major incidents to date. Security logging to a centralized SIEM with retention of at least 365 days.

Security is Our Top Priority

BOOK A DEMO TODAY

FAQ

Answers to Frequently Asked Questions About ShotSpotter

Security & Compliance

Product & Data Protection

General

Search