Introducing the New and Improved Match My Email Dashboard. View announcement.

Introducing Automated Calendar Sync.
Schedule a demo today.

MME Technology Blog

Match My Email is now SOC 2 Compliant

Match My Email, a leader in Salesforce email integration, is pleased to announce the successful completion of its System and Organization Controls (SOC) 2 Type II audit, achieving compliance with the leading industry standards for customer data security. This report shows Match My Email’s ongoing commitment to providing a secure data environment for our customers.

Developed by the American Institute of Certified Public Accountants (AICPA), a SOC 2 information security standard is a report that validates controls relevant to security, availability, integrity, confidentiality, and privacy.

The audit was completed with the help of Johanson Group LLP, a premier certification body helping organizations to obtain and maintain global compliance standards.

Why is security important at your company and what made you set out to get your SOC 2 Compliance?

Security is paramount at our company as it serves as the foundation for safeguarding sensitive information, maintaining the trust of our clients, and ensuring the integrity of our operations. In an era where cyber threats are constantly evolving, prioritizing security measures is not just a choice but a necessity. The protection of customer data, proprietary information, and the overall resilience of our systems are critical components of our business strategy. Security breaches not only jeopardize our reputation but also pose significant financial and legal risks. Therefore, our commitment to security is not only a reflection of ethical responsibility but also a strategic imperative to thrive in the digital landscape.

The decision to pursue SOC 2 compliance was driven by a proactive approach to elevate our security posture and demonstrate our commitment to meeting industry-recognized standards. SOC 2 compliance provides a comprehensive framework that assesses the effectiveness of our internal controls and processes related to security, availability, processing integrity, confidentiality, and privacy. Achieving SOC 2 compliance signifies to our clients, partners, and stakeholders that we adhere to rigorous security standards and have implemented robust measures to protect their data. It not only enhances our credibility in the market but also instills confidence among our stakeholders that we are dedicated to maintaining the highest levels of security and privacy in our operations. SOC 2 compliance is not just a regulatory checkbox but a strategic investment in building a resilient and trustworthy foundation for our business.

What is a SOC 2 report and how are Type I and Type II different?

A SOC 2 (System and Organization Controls 2) report is a comprehensive framework designed to assess and ensure the security, availability, processing integrity, confidentiality, and privacy of information within an organization. Developed by the American Institute of CPAs (AICPA), SOC 2 is particularly relevant for technology and cloud computing organizations that handle sensitive customer information.

There are two main types of SOC 2 reports: Type I and Type II.

  1. SOC 2 Type I:
    • Focus: Type I reports evaluate the suitability of the design of an organization’s controls at a specific point in time. It provides an overview of the organization’s control objectives and the design of controls to meet those objectives as of a specified date.
    • Timeline: It covers a specific moment in time, typically a single date.
  2. SOC 2 Type II:
    • Focus: Type II reports go a step further by not only assessing the design but also the operational effectiveness of these controls over a period of time, usually a minimum of six months. It evaluates how well the controls are implemented and maintained over time.
    • Timeline: It covers a specified period, demonstrating the effectiveness of controls over time.


In summary, while both Type I and Type II SOC 2 reports assess an organization’s adherence to security and privacy controls, Type I focuses on the suitability of the design of controls at a specific point in time, and Type II assesses the operational effectiveness of those controls over a designated period. Type II reports are generally considered more comprehensive and provide a more thorough evaluation of an organization’s commitment to security and compliance. The choice between Type I and Type II depends on the specific needs and expectations of the organization and its stakeholders.

Try Match My Email today.