Jetti Sheets | Trust Center
Trust Center
Welcome to the Jetti Sheets Trust Center. Access our compliance documentation, security policies, & data protection practices Minimal Access | Ephemeral Processing | Auto-Deletion | Google-Native Security
SOC 2 In Progress

Subprocessors

Jetti Sheets uses the following subprocessors to deliver our services

Google Cloud

Cloud infrastructure

Data location: us-west2

Workspace

Tools & Authentication

Polar.sh

License & billing

Monitoring

Continuously monitored by Secureframe
View all

Resources

Compliance

Monitoring

Organizational Management

Information Security Program Review
Management is responsible for the design, implementation, and management of the organization’s security policies and procedures. The policies and procedures are reviewed by management at least annually.

Risk Assessment

Risk Register
A risk register is maintained, which records the risk mitigation strategies for identified risks, and the development or modification of controls consistent with the risk mitigation strategy.
Vendor Due Diligence Review
Vendor SOC 2 reports (or equivalent) are collected and reviewed on at least an annual basis.

Access Security

Access to Product is Restricted
Non-console access to production infrastructure is restricted to users with a unique SSH key or access key
Unique Access IDs
Personnel are assigned unique IDs to access sensitive systems, networks, and information

Communications

Privacy Policy
A Privacy Policy to both external users and internal personnel. This policy details the company's privacy commitments.