The Trust Center

We take trust seriously.

Admin By Request provides cybersecurity solutions for enterprises of all sizes on every continent. This is how we make sure we’re providing reliable, secure, and compliant software for our customers at all times.

Compliance Regulations & Standards

Third-Party Testing & Reviews

Secure Software Development

Comprehensive Business Continuity

Compliance Pack

We’ve made it easy to get your hands on all the necessary documentation needed for compliance checks at your organization. Our Compliance Pack contains all the docs that you’ve got access to on this page – download it below.

Because you're not logged in, you'll only get the Public documents when you download the Compliance Pack. Log in to access all compliance documentation.

Note you're only getting Public documents in this Compliance Pack download. To access Protected documents as well, send us a request.

Public Documents

Anyone can get access to these docs. Hit the button on each one you want to download, or get all available documents by downloading our Compliance Pack above.

Protected Documents

These documents are restricted. Get in touch with us at the link below to gain access.
How We Handle Your Data (SLA)
This doc explains data flows and how we take care of your data.
Data Privacy Settings
The options for and consequences of disabling Personably Identifiable Information (PII) collection.
Terms & Conditions
The licensing agreement (SaaS contract) between your organization and ours.
SecurityScorecard Vulnerability Scan
Documentation of our perfect 100% score obtained from the industry-standard securityscorecard.com.
Transfer Impact Assessment (Schrems II)
Explains the mitigation measures we've taken in light of the Schrems II ruling invalidating Privacy Shield.
Data Processing Agreement (DPA)
The GDPR compliance agreement - see how it protects you.
ISO 27001
Our certificatation in the International Organization for Standardization 27001, ISMS.
Cyber Essentials Certification
Certificate of Assurance of the UK Government National Cyber Crime Security Centre program.
Support SLA
Our goals in relation to providing support to customers regarding problems with Admin By Request software.

Protected Documents

These documents are restricted. Get in touch with us at the link below to gain access.
Architectural Overview

Illustrates the architectural design of our software and systems.

Customer Contingency Plan
Explains what you can do to as customer in case of outages.
Certificate of Insurance
Documentation of proper insurance coverage for FastTrack Software.
Independent Endpoint Penetration Test
Penetration test of the endpoint software executed by independent security company.
Independent Azure Review
Review of Azure setup by independent Microsoft Gold Partner.
Independent Portal Penetration Test
Portal penetration test executed by independent security company.
CAIQ 4.0 Questionnaire
Cloud Security Alliance - Consensus Assessment Initiative Questionnaire (CAIQ).

Public Documents

How We Handle Your Data (SLA)
This doc explains data flows and how we take care of your data.
Data Privacy Settings
The options for and consequences of disabling Personably Identifiable Information (PII) collection.
Terms & Conditions
The licensing agreement (SaaS contract) between your organization and ours.
SecurityScorecard Vulnerability Scan
Documentation of our perfect 100% score obtained from the industry-standard securityscorecard.com.
Transfer Impact Assessment (Schrems II)
Explains the mitigation measures we've taken in light of the Schrems II ruling invalidating Privacy Shield.
Data Processing Agreement (DPA)
The GDPR compliance agreement - see how it protects you.
ISO 27001
Our certificatation in the International Organization for Standardization 27001, ISMS.
Cyber Essentials Certification
Certificate of Assurance of the UK Government National Cyber Crime Security Centre program.
Support SLA
Our goals in relation to providing support to customers regarding problems with Admin By Request software.

Protected Documents

Architectural Overview

Illustrates the architectural design of our software and systems.

Independent Endpoint Penetration Test
Penetration test of the endpoint software executed by independent security company.
Independent Portal Penetration Test
Portal penetration test executed by independent security company.
Customer Contingency Plan
Explains what you can do to as customer in case of outages.
Certificate of Insurance
Documentation of proper insurance coverage for FastTrack Software.
Independent Azure Review
Review of Azure setup by independent Microsoft Gold Partner.
CAIQ 4.0 Questionnaire
Cloud Security Alliance - Consensus Assessment Initiative Questionnaire (CAIQ).

We tick the compliance boxes so that your organization can too.