Trust & Compliance

At Kaunt, we are committed to the highest level of information security and data protection. We understand that safeguarding our own and our customers' data is not just at responsibility but a fundamental obligation.

This site will provide you with relevant insights into our data protection measures, certifications and audits.

Meet our DPO

Dedicated to Your Data's Security

If you have any questions, feel free to contact Kaunt's Data Protection Officer Marie Martens Lawsen through our contact page.

We are committed to providing you with peace of mind, knowing that your data is in reliable hands.

Welcome, and thank you for trusting Kaunt.

-Marie Martens Lawsen, DPO

Certifications

Kaunt is certified in ISO/IEC 27001:2013 and ISO/IEC 27701:2019 and annually has an ISAE3402 type 2 extended external audit carried out. Our external audit is ISAE 3000 type 2 and SOC 2 equivalent.

ISO/IEC 27001

ISO/IEC 27001 is an international standard for information security management systems (ISMS). It provides a systematic approach to managing sensitive company information so that it remains secure. This standard encompasses people, processes, and IT systems by applying a risk management process.

Framework for ISMS

ISO/IEC 27001 establishes a framework for setting up, implementing, operating, monitoring, reviewing, maintaining, and continually improving an ISMS. This ensures that an organization systematically manages sensitive information.

Risk Management

It emphasizes the importance of risk management. Organizations must identify potential risks to information security and implement appropriate controls to mitigate these risks.

Control Objectives and Controls

The standard includes a comprehensive set of security controls and control objectives. These cover areas such as physical security, access control, information security policies, and incident management.

Continual Improvement

ISO/IEC 27001 promotes a culture of continual improvement. Organizations are required to regularly review and update their information security practices to adapt to new threats and changes in the business environment.

Certification

Organizations can be audited and certified against ISO/IEC 27001 by accredited certification bodies. Certification provides third-party validation that an organization's ISMS meets the standard's requirements.
Kaunt is certified as part of Enversion Holding Group ApS by Bureau Veritas.

Legal and Regulatory Compliance

The standard helps organizations comply with legal and regulatory requirements related to information security. This can include data protection laws like GDPR.

Overall, ISO/IEC 27001 is a vital standard for organizations seeking to protect their information assets systematically and effectively, ensuring the confidentiality, integrity, and availability of their data.

ISO/IEC 27701

ISO/IEC 27701 is an international standard that provides guidelines for establishing, implementing, maintaining, and continually improving a privacy information management system (PIMS). It is an extension of ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of an organization's information security management system (ISMS).

Privacy Information Management System (PIMS)

ISO/IEC 27701 specifies the requirements and provides guidance for establishing a PIMS, ensuring that personal data is managed and processed with the highest standards of privacy.

Extension of ISO/IEC 27001 and ISO/IEC 27002

This standard extends the information security management requirements and controls of ISO/IEC 27001 and ISO/IEC 27002 to include privacy management, providing a comprehensive framework for data protection.

Compliance with Privacy Regulations

The standard helps organizations comply with various data protection regulations, such as the General Data Protection Regulation (GDPR) in Europe, the California Consumer Privacy Act (CCPA), and other national and international privacy laws.

Roles and Responsibilities

ISO/IEC 27701 defines roles and responsibilities for data controllers and data processors. It provides specific guidance on how organizations should manage and process personal data, ensuring accountability and transparency.

Risk Management

Similar to ISO/IEC 27001, ISO/IEC 27701 emphasizes the importance of risk management. Organizations must identify privacy risks and implement appropriate controls to mitigate these risks.

Control Objectives and Controls

The standard includes additional control objectives and controls specific to privacy management, such as those related to data subject rights, consent management, and data breach notification.

Certification

Organizations can be audited and certified against ISO/IEC 27701 by accredited certification bodies. Certification provides third-party validation that an organization's PIMS meets the standard's requirements.
Kaunt is certified as part of Enversion Holding Group ApS by Bureau Veritas.

Integration with ISMS

ISO/IEC 27701 is designed to be integrated with an existing ISMS based on ISO/IEC 27001, allowing organizations to manage information security and privacy together within a unified framework.

Overall, ISO/IEC 27701 is essential for organizations looking to establish robust privacy management practices, ensuring compliance with privacy laws, protecting personal data, and building trust with customers and stakeholders.

ISAE 3402 Type 2

SOC 2 TYPE 2 EQUIVALENT

ISAE 3402 (International Standard on Assurance Engagements 3402) is an international standard developed by the International Auditing and Assurance Standards Board (IAASB). It provides guidelines for auditors to assess and report on the controls of a service organization that affect the financial reporting of their clients. The standard is particularly relevant for organizations that provide services which impact their clients’ financial statements, such as data processing, payroll, or cloud computing services.

Additionally, the audit is extended to include controls on processing of personal data and this report is ISAE 3000 type 2 equivalent.

Management’s Description of the Service Organization’s System

This section includes a detailed description of the service organization’s system and the controls in place. It covers the control objectives, the nature and scope of services provided, and the boundaries of the system.

The Auditor’s Opinion

The auditor provides an opinion on whether the controls are suitably designed and operating effectively throughout the audit period. This opinion is based on testing and evaluating the controls in place.

Control Objectives and Related Controls

The report details the specific control objectives set by the service organization and the controls implemented to meet those objectives.

Description of Tests and Results

The auditor describes the tests performed to evaluate the effectiveness of the controls and the results of those tests. This includes any deficiencies identified and their potential impact.

Complementary User Entity Controls

The report often includes information on controls that are expected to be implemented by the service organization’s clients (user entities) to complement the controls provided by the service organization.

Assurance for Clients

The Type 2 report provides assurance to clients and their auditors that the service organization has effective controls in place to ensure the accuracy and reliability of the services provided.

Regulatory Compliance

It helps organizations comply with regulatory requirements and industry standards related to data security, financial reporting, and operational controls.

Risk Management

By identifying and addressing control deficiencies, the report helps mitigate risks associated with the use of outsourced services.

Vendor Management

Clients use ISAE 3402 Type 2 reports to evaluate and monitor the performance and reliability of their service providers.

Overall, an ISAE 3402 Type 2 audit report offers a detailed assessment of the effectiveness of controls over a period, providing significant assurance to clients regarding the reliability and security of services provided by the service organization.