Security & Privacy
Security and privacy are built into our DNA.
PCI Level 1 Compliant
Basis Theory’s environment has been independently verified to meet or exceed the Payment Card Institute Data Security Standard (PCI DSS) for Level 1 merchants and service providers.
Basis Theory’s environment has been independently verified to meet or exceed the Payment Card Institute Data Security Standard (PCI DSS) for Level 1 merchants and service providers.
Basis Theory’s environment has been independently verified to meet or exceed the Payment Card Institute Data Security Standard (PCI DSS) for Level 1 merchants and service providers.
SOC 2 Type II Certified
External assessment have validated Basis Theory’s compliance, security, privacy, and risk posture to meet or exceed SOC 2 Type II requirements.
External assessment have validated Basis Theory’s compliance, security, privacy, and risk posture to meet or exceed SOC 2 Type II requirements.
External assessment have validated Basis Theory’s compliance, security, privacy, and risk posture to meet or exceed SOC 2 Type II requirements.
ISO 27001 Certified
Achieved ISO 27001 certification, reflecting our commitment to information security management excellence.
Achieved ISO 27001 certification, reflecting our commitment to information security management excellence.
Achieved ISO 27001 certification, reflecting our commitment to information security management excellence.
HIPAA Compliant
Protect, authorize, and share patient’s protected health information (PHI) in our independently certified compliant environment.
Protect, authorize, and share patient’s protected health information (PHI) in our independently certified compliant environment.
Protect, authorize, and share patient’s protected health information (PHI) in our independently certified compliant environment.
Security concerns?
For security inquiries or concerns, contact our security, compliance, and risk teams, and explore our Bug Bounty Program.
Safely
accept
collect
manage
share
accept
manage
card data.
Jump out to an early lead. Explore, iterate, and scale regulated products faster than the competition.
Safely
accept
collect
manage
share
accept
collect
card data.
Jump out to an early lead. Explore, iterate, and scale regulated products faster than the competition.
Safely
accept
collect
manage
share
accept
manage
card data.
Jump out to an early lead. Explore, iterate, and scale regulated products faster than the competition.