Your Business Relies on Trust
At Grosvenor Technology, security and compliance are the foundations of everything we build. Our comprehensive certifications demonstrate our commitment to protecting data, ensuring accuracy, and maintaining the highest standards of quality and security.
Certifications
Independently Verified. Continuously Monitored.
Cert no. 8489
Cert no. 8489
Why This Matters
When you choose Grosvenor, you’re not just taking our word that your data is secure – you’re getting independent, third-party proof.
SOC 1 & SOC 2 Type II certifications mean that external auditors have rigorously tested our controls over an extended period and verified they work as intended.
- SOC 2 confirms we meet the high standards for Security, Availability, Processing Integrity, Confidentiality, and Privacy.
- ISO 27001 validates our information security management system protects sensitive data from threats and breaches.
- ISO 9001 ensures consistent quality in everything we deliver.
Together, these certifications provide comprehensive protection for operations. Business and employee data are protected by controls that are continuously monitored and independently verified – giving peace of mind and reducing your compliance burden.
What We Protect
Time & Attendance Data Clock-in/out records, scheduling information, and attendance tracking are encrypted and processed with verified integrity.
Biometric Information Fingerprint and facial recognition data is encrypted in transit and at rest, following strict privacy protocols.
Business Data All system data is protected by multiple layers of security controls, regularly tested and validated by independent auditors.
System Availability Verified backup systems, disaster recovery processes, and business continuity plans ensure data remains secure and accessible.
Frequently Asked Questions
Data Security Questions
SOC 2 Type II validates our controls for protecting sensitive data, including biometrics. Independent auditors validate our processes and infrastructure against the trust service criteria of Security, Availability, Processing Integrity, Confidentiality and Privacy.
Our certified controls ensure all clock-in/out data is protected at the device and encrypted during transit and storage in our GTConnect cloud platform.
Yes. Our SOC 2 Type II reports, ISO 27001 and ISO 9001 certificates are available upon request.
Yes. Our security controls extend to the physical devices, which have tamper-resistant features. All devices have been verified to EN 18031 series of requirements.
Request Documentation
If you have any questions regarding these approvals, please contact