Security & Privacy

Security and privacy are built into our DNA.

PCI Level 1 badge
PCI Level  1 Compliant

Basis Theory’s environment has been independently verified to meet or exceed the Payment Card Institute Data Security Standard (PCI DSS) for Level 1 merchants and service providers.

Basis Theory’s environment has been independently verified to meet or exceed the Payment Card Institute Data Security Standard (PCI DSS) for Level 1 merchants and service providers.

Basis Theory’s environment has been independently verified to meet or exceed the Payment Card Institute Data Security Standard (PCI DSS) for Level 1 merchants and service providers.

SOC 2 Type II Badge
SOC 2 Type II Certified

External assessment have validated Basis Theory’s compliance, security, privacy, and risk posture to meet or exceed SOC 2 Type II requirements.

External assessment have validated Basis Theory’s compliance, security, privacy, and risk posture to meet or exceed SOC 2 Type II requirements.

External assessment have validated Basis Theory’s compliance, security, privacy, and risk posture to meet or exceed SOC 2 Type II requirements.

SOC 2 Type II Badge
SOC 2 Type II Badge
ISO 27001 Certified

Achieved ISO 27001 certification, reflecting our commitment to information security management excellence.

Achieved ISO 27001 certification, reflecting our commitment to information security management excellence.

Achieved ISO 27001 certification, reflecting our commitment to information security management excellence.

HIPAA Compliant badge
HIPAA Compliant badge
HIPAA Compliant

Protect, authorize, and share patient’s protected health information (PHI) in our independently certified compliant environment.

Protect, authorize, and share patient’s protected health information (PHI) in our independently certified compliant environment.

Protect, authorize, and share patient’s protected health information (PHI) in our independently certified compliant environment.

Security concerns?

For security inquiries or concerns, contact our security, compliance, and risk teams, and explore our Bug Bounty Program.

Safely

accept

collect

manage

share

accept

manage

card data.

Jump out to an early lead. Explore, iterate, and scale regulated products faster than the competition.

Safely

accept

collect

manage

share

accept

collect

card data.

Jump out to an early lead. Explore, iterate, and scale regulated products faster than the competition.

Safely

accept

collect

manage

share

accept

manage

card data.

Jump out to an early lead. Explore, iterate, and scale regulated products faster than the competition.