• Skip to primary navigation
  • Skip to main content
PFL

PFL

  • Get In Touch
MENUMENU
  • Solutions
        • Technology

          • Tactile Marketing Automation
          • Integrate direct mail into your marketing automation programs.
          • Personal Marketing Center®
          • Sales asset management solution for 1:1 outreach on every channel.

          • Preferred Address Capture
          • Address Validation and Append Services
        • Print & Packaging

          • Creative Collection
          • Personalized Print-on-Demand
          • Handwritten Notes
          • Video Mailers
          • On-Site Laser Engraving
          • eGift Cards
          • PrintingForLess.com
  • How We Help
  • Resources
          • Blog
        • Categories

          • Account-Based Marketing
          • Multichannel Marketing
          • Direct Mail Marketing
          • Sales Enablement
          • B2B Marketing
          • Financial Services Marketing
        • Your 2020 Goals Are Still On!
          Here's How to Stay on Track:

          • Enhance Virtual Experiences with the Physical Reality of Your Brand
          • Keep Business Moving with Direct Mail – What PFL Customers Are Doing
          • How to Confirm Preferred Mailing Addresses
          • Real-Time Updates on PFL Fulfillment and Delivery
  • Customer Success
  • About Us
      • Why PFL
      • PFL Story
      • Sustainability
      • Careers
      • Events
      • News
      • Contact Us

PFLTrust Compliance

AIPCA-SOC logo

SOC 1 Type 1

PFL processes are audited against the SOC reporting framework by independent third-party auditors. The audit covers controls for data security, availability, processing integrity, and confidentiality as applicable to in-scope trust principles for each service.
PFL has achieved SOC 1 Type 2, and SOC 2 Type 2 reports. In general, the availability of SOC 1 and SOC 2 reports is restricted to customers who have signed nondisclosure agreements with PFL.
AIPCA-SOC logo

SOC 2 Type 2

PFL processes are audited against the SOC reporting framework by independent third-party auditors. The audit covers controls for data security, availability, processing integrity, and confidentiality as applicable to in-scope trust principles for each service.
PFL has achieved SOC 1 Type 2, and SOC 2 Type 2 reports. In general, the availability of SOC 1 and SOC 2 reports is restricted to customers who have signed nondisclosure agreements with PFL.
PCI logo

PCI DSS

The Payment Card Industry Data Security Standards (PCI DSS) is a proprietary information security standard designed to ensure that companies processing, storing or transmitting payment card information maintain a secure environment. The PCI DSS applies to credit cards from the major card brands, including Visa, MasterCard, American Express, Discover, and JCB. A third-party PCI Qualified Security Assessor (QSA) assesses company systems and processes on an annual basis and issues an Attestation of Compliance (AOC).
HIPAA logo

HIPAA

The Health Insurance Portability & Accountability Act (HIPAA) regulations require that covered entities and their business associates enter into contracts to ensure that those business associates will adequately protect PHI. These contracts, or BAAs, clarify and limit how the business associate can handle PHI, and set forth each party’s adherence to the security and privacy provisions set forth in HIPAA and the HITECH Act.
Currently there is no official certification for HIPAA compliance. However, PFL’s HIPAA Compliance Program utilizes an automated and online HIPAA compliance and training solution for developing, administering, documenting and monitoring the program. The program methodology is based on National Institute of Standards and Technology (NIST) cyber security protocols endorsed by the Office for Civil Rights for compliance with the HIPAA Security Rule.
NIST- ogo The National Institute of Standards and Technology (NIST) framework was designed to be voluntary, the NIST has not formalized an accreditation process. However, PFL utilizes an accredited solution for developing, administering, documenting and monitoring PFL’s Cybersecurity processes.
Share
Share
Tweet
Pin
Email
PFL

PFL

  • PRINTINGFORLESS.COM
  • About Us
  • Contact Us
  • Partner With Us
  • LinkedIn
  • Facebook
  • Twitter
  • Instagram
  • YouTube
  • Pinterest
Copyright Ⓒ 1998 - 2021 PFL. All Rights Reserved.

Terms of Service Privacy Policy Trust

logo
Get In Touch
  • Solutions
  • Tactile Marketing Automation®
  • SwagIQ®
  • Personal Marketing Center®
  • How We Help
  • Resources
  • Customer Success
  • About Us