{"id":36860,"date":"2026-01-16T16:46:33","date_gmt":"2026-01-16T22:46:33","guid":{"rendered":"https:\/\/www.filecloud.com\/blog\/?p=36860"},"modified":"2026-01-16T16:46:33","modified_gmt":"2026-01-16T22:46:33","slug":"soc-2-type-2-reports-filecloud-signority","status":"publish","type":"post","link":"https:\/\/www.filecloud.com\/blog\/soc-2-type-2-reports-filecloud-signority\/","title":{"rendered":"SOC 2 Type 2 Reports &#8211; FileCloud and Signority"},"content":{"rendered":"<h1>FileCloud and Signority Complete SOC 2<sup>\u00ae<\/sup>\u00a0Type 2 Audits: What This Means for Enterprise Security<\/h1>\n<p>When evaluating enterprise software vendors, particularly those handling sensitive data, security audits and reporting serve as critical decision-making criteria. Both <a href=\"https:\/\/www.filecloud.com\/\" target=\"_blank\" rel=\"noopener\">FileCloud<\/a> and <a href=\"https:\/\/signority.com\/\" target=\"_blank\" rel=\"noopener\">Signority<\/a> have received SOC 2 (System and Organization Controls 2) Type 2 reports\u2014a significant milestone that demonstrates our sustained commitment to protecting an organization\u2019s most valuable asset: data.<\/p>\n<p>This achievement represents more than a compliance checkbox. It provides independent verification that security controls operate effectively over time, offering the operational assurance that CTOs, CISOs, and compliance officers require when selecting technology partners for mission-critical deployments.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-36923\" src=\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2026\/01\/SOC-2-Type-2-banner.png\" alt=\"\" width=\"2440\" height=\"1254\" srcset=\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2026\/01\/SOC-2-Type-2-banner.png 2440w, https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2026\/01\/SOC-2-Type-2-banner-1024x526.png 1024w, https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2026\/01\/SOC-2-Type-2-banner-768x395.png 768w, https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2026\/01\/SOC-2-Type-2-banner-1536x789.png 1536w, https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2026\/01\/SOC-2-Type-2-banner-2048x1053.png 2048w\" sizes=\"(max-width: 2440px) 100vw, 2440px\"><\/p>\n<h2>Understanding SOC 2 Type 2 Reports<\/h2>\n<p>SOC 2 Type 2 reports (sometimes appearing as SOC 2 Type ii reports) represent the gold standard for evaluating service organizations\u2019 security posture. Developed by the <a href=\"https:\/\/www.aicpa-cima.com\/resources\/download\/soc-for-service-organizations-engagements-overview\" target=\"_blank\" rel=\"noopener\">American Institute of Certified Public Accountants (AICPA)<\/a>, the SOC framework provides a rigorous assessment methodology that goes far beyond surface-level security reviews.<\/p>\n<p>Unlike SOC 2 Type 1 audits, which evaluate whether appropriate controls exist at a single point in time, the SOC 2 Type 2 audit examines whether those controls operated effectively throughout an extended observation period. <a href=\"https:\/\/prescientsecurity.com\/prescient-assurance-services\" target=\"_blank\" rel=\"noopener\">Prescient Assurance LLC<\/a> conducted comprehensive assessments for FileCloud (June 1, 2025 to October 31, 2025) and Signority (August 9, 2024 through October 31, 2025).<\/p>\n<p>This temporal dimension matters. Any organization can implement security controls temporarily for an audit snapshot. Maintaining those controls consistently across months of operation\u2014adapting to threats, managing incidents, and sustaining operational discipline\u2014demonstrates genuine security maturity.<\/p>\n<div class=\"inline-imgs\"><img decoding=\"async\" class=\"\" style=\"max-width: 150px;\" src=\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2026\/01\/PS-Badges-RGB_SOC2-Type2.png\" alt=\"Prescient Security badge image for SOC 2 Type 2 audit of FileCloud and Signority\"><img decoding=\"async\" class=\"\" style=\"max-width: 150px;\" src=\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2026\/01\/21972-312_SOC_NonCPA.jpg\" alt=\"AICPA badge for SOC 2 Type 2 report\"><\/div>\n<h2>The Five Trust Service Criteria<\/h2>\n<p>The SOC 2 Type 2 report evaluates organizations against five critical Trust Service Criteria that form the foundation of comprehensive information security:<\/p>\n<ol>\n<li><strong>Security<\/strong> addresses whether systems are protected against unauthorized access, both physical and logical. This encompasses network security, access controls, system monitoring, and incident response capabilities.<\/li>\n<li><strong>Confidentiality<\/strong> examines how organizations protect information designated as confidential. This criterion proves particularly relevant for enterprises in regulated industries where data protection requirements extend beyond general security practices.<\/li>\n<li><strong>Processing Integrity<\/strong> validates that systems process data completely, accurately, and in a timely manner. For content collaboration platforms, this ensures that files sync correctly, versions maintain integrity, and workflows execute as designed.<\/li>\n<li><strong>Availability<\/strong> confirms that systems remain operational and accessible as committed. For organizations depending on file sharing and e-signature capabilities for business-critical operations, availability directly impacts productivity and revenue.<\/li>\n<li><strong>Privacy<\/strong> addresses how organizations collect, use, retain, disclose, and dispose of personal information in conformity with privacy commitments. With evolving global privacy regulations, this criterion has become increasingly significant for multinational deployments.<\/li>\n<\/ol>\n<h2>Why SOC 2 Type 2 Compliance Matters for Enterprise Procurement<\/h2>\n<p>For organizations evaluating content collaboration and e-signature solutions (such as FileCloud and Signority), SOC 2 Type 2 compliance delivers tangible benefits that extend beyond security assurance:<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-36871\" src=\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2026\/01\/Risk-Mitigation-Light.png\" alt=\"\" width=\"1800\" height=\"300\" srcset=\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2026\/01\/Risk-Mitigation-Light.png 1800w, https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2026\/01\/Risk-Mitigation-Light-1024x171.png 1024w, https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2026\/01\/Risk-Mitigation-Light-768x128.png 768w, https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2026\/01\/Risk-Mitigation-Light-1536x256.png 1536w\" sizes=\"(max-width: 1800px) 100vw, 1800px\"><\/p>\n<p><strong>Risk mitigation for regulated industries<\/strong>: Healthcare organizations managing HIPAA-protected information, financial institutions handling sensitive client data, and defense contractors working with controlled unclassified information require vendors who demonstrate proven security capabilities. The SOC 2 Type 2 audit provides the documented evidence these organizations need.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-36869\" src=\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2026\/01\/Rapid-Assessment-Light.png\" alt=\"\" width=\"1800\" height=\"300\" srcset=\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2026\/01\/Rapid-Assessment-Light.png 1800w, https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2026\/01\/Rapid-Assessment-Light-1024x171.png 1024w, https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2026\/01\/Rapid-Assessment-Light-768x128.png 768w, https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2026\/01\/Rapid-Assessment-Light-1536x256.png 1536w\" sizes=\"(max-width: 1800px) 100vw, 1800px\"><\/p>\n<p><strong>Streamlined vendor assessments<\/strong>: IT administrators and compliance officers often spend significant time conducting security assessments of potential vendors. A comprehensive SOC 2 Type 2 report reduces this burden by providing standardized, independently verified security documentation that satisfies many vendor risk assessment frameworks.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-36873\" src=\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2026\/01\/Regulatory-Compliance-Light.png\" alt=\"\" width=\"1800\" height=\"300\" srcset=\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2026\/01\/Regulatory-Compliance-Light.png 1800w, https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2026\/01\/Regulatory-Compliance-Light-1024x171.png 1024w, https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2026\/01\/Regulatory-Compliance-Light-768x128.png 768w, https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2026\/01\/Regulatory-Compliance-Light-1536x256.png 1536w\" sizes=\"(max-width: 1800px) 100vw, 1800px\"><\/p>\n<p><strong>Audit support and regulatory compliance<\/strong>: When organizations undergo their own compliance audits\u2014whether for industry standards, regulatory requirements, or customer commitments\u2014they must demonstrate that third-party vendors maintain appropriate security controls. SOC 2 Type 2 reports provide the documentation auditors expect, reducing the compliance burden on internal teams.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-36874\" src=\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2026\/01\/Operational-Confidence-Light.png\" alt=\"\" width=\"1800\" height=\"300\" srcset=\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2026\/01\/Operational-Confidence-Light.png 1800w, https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2026\/01\/Operational-Confidence-Light-1024x171.png 1024w, https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2026\/01\/Operational-Confidence-Light-768x128.png 768w, https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2026\/01\/Operational-Confidence-Light-1536x256.png 1536w\" sizes=\"(max-width: 1800px) 100vw, 1800px\"><\/p>\n<p><strong>Operational confidence<\/strong>: Perhaps most importantly, SOC 2 Type 2 reports provide operational confidence that security isn\u2019t simply a marketing claim but a verified, sustained organizational capability.<\/p>\n<h2>FileCloud\u2019s Multi-Layered Security Approach<\/h2>\n<p>FileCloud and Signority\u2019s SOC 2 Type 2 reports complement existing certifications and compliance frameworks the platforms have been awarded, including <a href=\"https:\/\/www.filecloud.com\/blog\/filecloud-achieves-iso-27001-certification\/\" target=\"_blank\" rel=\"noopener\">ISO 27001:2022<\/a>, <a href=\"https:\/\/www.filecloud.com\/blog\/iso-9001-certification\/\" target=\"_blank\" rel=\"noopener\">ISO 9001:2015<\/a>, <a href=\"https:\/\/www.filecloud.com\/compliance-center\/\" target=\"_blank\" rel=\"noopener\">HIPAA, GDPR, NIST, and more<\/a>. The comprehensive security framework built into both FileCloud and Signority fulfill enterprise requirements for systematic information security management and operational controls.<\/p>\n<p>FileCloud\u2019s content-centric security model implements protection at every architectural layer\u2014from encrypted storage foundations and granular access controls, through metadata classification and data leak prevention, to governance policies and digital rights management that persist even after content leaves the platform. This approach ensures that security controls adapt to content sensitivity and organizational requirements rather than applying uniform protection across all data.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-36875\" src=\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2026\/01\/FileCloud-Content-Model-Light.png\" alt=\"FileCloud Content Model graphic - half circle with arcs showing layers of FileCloud's security framework. \" width=\"1800\" height=\"900\" srcset=\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2026\/01\/FileCloud-Content-Model-Light.png 1800w, https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2026\/01\/FileCloud-Content-Model-Light-1024x512.png 1024w, https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2026\/01\/FileCloud-Content-Model-Light-768x384.png 768w, https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2026\/01\/FileCloud-Content-Model-Light-1536x768.png 1536w\" sizes=\"(max-width: 1800px) 100vw, 1800px\"><\/p>\n<p>Similarly, Signority maintains rigorous security standards throughout the e-signature workflow, including comprehensive audit trails that provide tamper-proof documentation of every transaction, ensuring document validity and non-repudiation.<\/p>\n<p>This architectural approach proves particularly valuable for organizations operating across multiple regulatory jurisdictions. The layered security controls address both systematic information security management requirements and specific operational mandates.<\/p>\n<h2>What This Means for FileCloud and Signority Customers<\/h2>\n<p>For existing and prospective customers, our SOC 2 Type 2 reports provide several immediate benefits:<\/p>\n<ul>\n<li>Organizations can accelerate their procurement processes by leveraging our independently verified security documentation rather than conducting extensive custom security assessments.<\/li>\n<li>IT administrators gain confidence that the platforms they deploy and manage maintain consistent security postures across ongoing operations.<\/li>\n<li>Compliance officers can satisfy audit requirements more efficiently by referencing comprehensive third-party security reports.<\/li>\n<li>C-suite executives responsible for organizational risk management can make informed decisions knowing that FileCloud and Signority have submitted to rigorous, independent security evaluations conducted according to industry-standard frameworks.<\/li>\n<\/ul>\n<h2>Moving Forward: Our Commitment to Security Excellence<\/h2>\n<p>Achieving SOC 2 Type 2 reports for both FileCloud and Signority platforms represents a significant milestone that we\u2019re proud to mark. However, security remains a continuous journey. FileCloud maintains ongoing commitments to security excellence through regular security assessments, continuous monitoring, threat intelligence integration, and proactive control enhancements.<\/p>\n<p>Our security practices don\u2019t exist solely to satisfy compliance requirements\u2014they\u2019re fundamental to how we design, develop, and operate our platforms. The SOC 2 Type 2 reports simply provide independent verification of what we\u2019ve built into our organizational DNA.<\/p>\n<p>For organizations seeking content collaboration and e-signature solutions that meet the highest security standards, FileCloud and Signority now offer the documented assurance that enterprise procurement demands. Visit the <a href=\"https:\/\/trust.filecloud.com\/\">FileCloud Trust Center<\/a> to access our SOC 2 Type 2 reports and explore our comprehensive security documentation.<\/p>\n<hr>\n<h2>Frequently Asked Questions About SOC 2 Type 2<\/h2>\n<h3>What is SOC 2 Type 2?<\/h3>\n<p>SOC 2 Type 2 is an auditing standard that evaluates how effectively a service organization\u2019s security controls operate over an extended time period, typically six to twelve months. Unlike Type 1, which assesses controls at a single point in time, Type 2 provides assurance of sustained operational effectiveness.<\/p>\n<h3>What are SOC 2 Type 2 criteria?<\/h3>\n<p>The SOC 2 framework evaluates five Trust Service Criteria: Security (required for all audits), plus Confidentiality, Processing Integrity, Availability, and Privacy (selected based on the organization\u2019s services and commitments). Organizations choose which criteria beyond Security apply to their operations.<\/p>\n<h3>Why is SOC 2 Type 2 required?<\/h3>\n<p>While not universally mandated by law, many enterprises require SOC 2 Type 2 reports from vendors handling sensitive data. This requirement stems from organizations\u2019 own compliance obligations\u2014they must ensure third-party providers maintain appropriate security controls. Additionally, industries like healthcare, finance, and government frequently establish SOC 2 Type 2 as a procurement prerequisite.<\/p>\n<h3>Who needs SOC 2 Type 2?<\/h3>\n<p>Any organization providing services that involve storing, processing, or transmitting customer data should consider a SOC 2 Type 2 audit. This particularly applies to SaaS providers, cloud service providers, data centers, and technology companies serving enterprise customers in regulated industries. For service providers, obtaining reports often represents a competitive necessity rather than an optional enhancement.<\/p>\n<hr>\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>FileCloud and Signority Complete SOC 2\u00ae\u00a0Type 2 Audits: What This Means for Enterprise Security When evaluating enterprise software vendors, particularly those handling sensitive data, security audits and reporting serve as critical decision-making criteria. Both FileCloud and Signority have received SOC 2 (System and Organization Controls 2) Type 2 reports\u2014a significant milestone that demonstrates our sustained [&hellip;]<\/p>\n","protected":false},"author":31,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1926,284,1867,1,20,72],"tags":[2080,2081,2078,2077,2079],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v20.13) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SOC 2 Type 2 Reports - FileCloud and Signority - FileCloud blog<\/title>\n<meta name=\"description\" content=\"SOC 2 Type 2 reports now available for FileCloud and Signority. Learn more about our commitment to world-class security frameworks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.filecloud.com\/blog\/soc-2-type-2-reports-filecloud-signority\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SOC 2 Type 2 Reports - FileCloud and Signority\" \/>\n<meta property=\"og:description\" content=\"SOC 2 Type 2 reports now available for FileCloud and Signority. Learn more about our commitment to world-class security frameworks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.filecloud.com\/blog\/soc-2-type-2-reports-filecloud-signority\/\" \/>\n<meta property=\"og:site_name\" content=\"FileCloud blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/tonidopage\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-16T22:46:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2026\/01\/SOC-2-Type-2-banner.png\" \/>\n<meta name=\"author\" content=\"Katie Gerhardt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@getfilecloud\" \/>\n<meta name=\"twitter:site\" content=\"@getfilecloud\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Katie Gerhardt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/soc-2-type-2-reports-filecloud-signority\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/soc-2-type-2-reports-filecloud-signority\/\"},\"author\":{\"name\":\"Katie Gerhardt\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/ea3506ea3e9eb7bb2036e6c7c8fc05ea\"},\"headline\":\"SOC 2 Type 2 Reports &#8211; FileCloud and Signority\",\"datePublished\":\"2026-01-16T22:46:33+00:00\",\"dateModified\":\"2026-01-16T22:46:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/soc-2-type-2-reports-filecloud-signority\/\"},\"wordCount\":1199,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/#organization\"},\"keywords\":[\"FileCloud SOC 2 Type 2 Certification\",\"Signority SOC 2 Type 2 Certification\",\"SOC 2 report\",\"SOC 2 type 2\",\"SOC 2 Type 2 Certification\"],\"articleSection\":[\"Compliance\",\"data governance\",\"Enterprise Content Management\",\"Enterprise File Sharing\",\"FileCloud\",\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.filecloud.com\/blog\/soc-2-type-2-reports-filecloud-signority\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/soc-2-type-2-reports-filecloud-signority\/\",\"url\":\"https:\/\/www.filecloud.com\/blog\/soc-2-type-2-reports-filecloud-signority\/\",\"name\":\"SOC 2 Type 2 Reports - FileCloud and Signority - FileCloud blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/#website\"},\"datePublished\":\"2026-01-16T22:46:33+00:00\",\"dateModified\":\"2026-01-16T22:46:33+00:00\",\"description\":\"SOC 2 Type 2 reports now available for FileCloud and Signority. Learn more about our commitment to world-class security frameworks.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/soc-2-type-2-reports-filecloud-signority\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.filecloud.com\/blog\/soc-2-type-2-reports-filecloud-signority\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/soc-2-type-2-reports-filecloud-signority\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.filecloud.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SOC 2 Type 2 Reports &#8211; FileCloud and Signority\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#website\",\"url\":\"https:\/\/www.filecloud.com\/blog\/\",\"name\":\"FileCloud blog\",\"description\":\"Topics on Private cloud, On-Premises, Self-Hosted, Enterprise File Sync and Sharing\",\"publisher\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.filecloud.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#organization\",\"name\":\"FileCloud\",\"url\":\"https:\/\/www.filecloud.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2016\/02\/filecloud_logo_comparison.jpg\",\"contentUrl\":\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2016\/02\/filecloud_logo_comparison.jpg\",\"width\":155,\"height\":40,\"caption\":\"FileCloud\"},\"image\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/tonidopage\",\"https:\/\/twitter.com\/getfilecloud\",\"https:\/\/www.linkedin.com\/company\/codelathe\",\"https:\/\/www.pinterest.com\/filecloud\/filecloud\/\",\"https:\/\/www.youtube.com\/channel\/UCbU5gTFdNCPESA5aGipFW6g\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/ea3506ea3e9eb7bb2036e6c7c8fc05ea\",\"name\":\"Katie Gerhardt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/07bbf4097008eebfdc680520a6973c6e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/07bbf4097008eebfdc680520a6973c6e?s=96&d=mm&r=g\",\"caption\":\"Katie Gerhardt\"},\"description\":\"Product Marketing Manager\",\"sameAs\":[\"1\",\"https:\/\/www.linkedin.com\/in\/katie-gerhardt-88541791\/\"],\"url\":\"https:\/\/www.filecloud.com\/blog\/author\/katie\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SOC 2 Type 2 Reports - FileCloud and Signority - FileCloud blog","description":"SOC 2 Type 2 reports now available for FileCloud and Signority. Learn more about our commitment to world-class security frameworks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.filecloud.com\/blog\/soc-2-type-2-reports-filecloud-signority\/","og_locale":"en_US","og_type":"article","og_title":"SOC 2 Type 2 Reports - FileCloud and Signority","og_description":"SOC 2 Type 2 reports now available for FileCloud and Signority. Learn more about our commitment to world-class security frameworks.","og_url":"https:\/\/www.filecloud.com\/blog\/soc-2-type-2-reports-filecloud-signority\/","og_site_name":"FileCloud blog","article_publisher":"https:\/\/www.facebook.com\/tonidopage","article_published_time":"2026-01-16T22:46:33+00:00","og_image":[{"url":"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2026\/01\/SOC-2-Type-2-banner.png"}],"author":"Katie Gerhardt","twitter_card":"summary_large_image","twitter_creator":"@getfilecloud","twitter_site":"@getfilecloud","twitter_misc":{"Written by":"Katie Gerhardt","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.filecloud.com\/blog\/soc-2-type-2-reports-filecloud-signority\/#article","isPartOf":{"@id":"https:\/\/www.filecloud.com\/blog\/soc-2-type-2-reports-filecloud-signority\/"},"author":{"name":"Katie Gerhardt","@id":"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/ea3506ea3e9eb7bb2036e6c7c8fc05ea"},"headline":"SOC 2 Type 2 Reports &#8211; FileCloud and Signority","datePublished":"2026-01-16T22:46:33+00:00","dateModified":"2026-01-16T22:46:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.filecloud.com\/blog\/soc-2-type-2-reports-filecloud-signority\/"},"wordCount":1199,"commentCount":0,"publisher":{"@id":"https:\/\/www.filecloud.com\/blog\/#organization"},"keywords":["FileCloud SOC 2 Type 2 Certification","Signority SOC 2 Type 2 Certification","SOC 2 report","SOC 2 type 2","SOC 2 Type 2 Certification"],"articleSection":["Compliance","data governance","Enterprise Content Management","Enterprise File Sharing","FileCloud","Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.filecloud.com\/blog\/soc-2-type-2-reports-filecloud-signority\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.filecloud.com\/blog\/soc-2-type-2-reports-filecloud-signority\/","url":"https:\/\/www.filecloud.com\/blog\/soc-2-type-2-reports-filecloud-signority\/","name":"SOC 2 Type 2 Reports - FileCloud and Signority - FileCloud blog","isPartOf":{"@id":"https:\/\/www.filecloud.com\/blog\/#website"},"datePublished":"2026-01-16T22:46:33+00:00","dateModified":"2026-01-16T22:46:33+00:00","description":"SOC 2 Type 2 reports now available for FileCloud and Signority. Learn more about our commitment to world-class security frameworks.","breadcrumb":{"@id":"https:\/\/www.filecloud.com\/blog\/soc-2-type-2-reports-filecloud-signority\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.filecloud.com\/blog\/soc-2-type-2-reports-filecloud-signority\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.filecloud.com\/blog\/soc-2-type-2-reports-filecloud-signority\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.filecloud.com\/blog\/"},{"@type":"ListItem","position":2,"name":"SOC 2 Type 2 Reports &#8211; FileCloud and Signority"}]},{"@type":"WebSite","@id":"https:\/\/www.filecloud.com\/blog\/#website","url":"https:\/\/www.filecloud.com\/blog\/","name":"FileCloud blog","description":"Topics on Private cloud, On-Premises, Self-Hosted, Enterprise File Sync and Sharing","publisher":{"@id":"https:\/\/www.filecloud.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.filecloud.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.filecloud.com\/blog\/#organization","name":"FileCloud","url":"https:\/\/www.filecloud.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.filecloud.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2016\/02\/filecloud_logo_comparison.jpg","contentUrl":"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2016\/02\/filecloud_logo_comparison.jpg","width":155,"height":40,"caption":"FileCloud"},"image":{"@id":"https:\/\/www.filecloud.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/tonidopage","https:\/\/twitter.com\/getfilecloud","https:\/\/www.linkedin.com\/company\/codelathe","https:\/\/www.pinterest.com\/filecloud\/filecloud\/","https:\/\/www.youtube.com\/channel\/UCbU5gTFdNCPESA5aGipFW6g"]},{"@type":"Person","@id":"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/ea3506ea3e9eb7bb2036e6c7c8fc05ea","name":"Katie Gerhardt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/07bbf4097008eebfdc680520a6973c6e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/07bbf4097008eebfdc680520a6973c6e?s=96&d=mm&r=g","caption":"Katie Gerhardt"},"description":"Product Marketing Manager","sameAs":["1","https:\/\/www.linkedin.com\/in\/katie-gerhardt-88541791\/"],"url":"https:\/\/www.filecloud.com\/blog\/author\/katie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/posts\/36860"}],"collection":[{"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/users\/31"}],"replies":[{"embeddable":true,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/comments?post=36860"}],"version-history":[{"count":13,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/posts\/36860\/revisions"}],"predecessor-version":[{"id":36924,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/posts\/36860\/revisions\/36924"}],"wp:attachment":[{"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/media?parent=36860"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/categories?post=36860"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/tags?post=36860"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}