Storysnap | Trust Center
Storysnap Trust Center
Storysnap, LLC DBA Testimonial Hero & Product Hype. Storysnap creates strategic video marketing assets—including customer testimonials and product showcases—to help companies eliminate trust gaps and close deals faster. Leading technology, software, building materials, and manufacturing industries leverage video content from Storysnap’s portfolio (Testimonial Hero and Product Hype) across their entire go-to-market strategies. Storysnap takes the privilege of working with both its clients and its client's customers seriously and is creating a robust security posture to protect everyone.
Resources

Monitoring

Continuously monitored by Secureframe

Compliance

SOC 2

In progress | Service Organization Controls (SOC 2) (Type II) trust services principles

GDPR

In progress | Protect the personal data and privacy of EU citizens for transactions that occur within EU member states

Subprocessors

Coming soon...

Resources

Privacy Policy

Details on how we collect and use information

Terms of Service

Storysnap's terms for its website.

Main Services Agreement

Agreement setting the terms between Storysnap and its clients.

Monitoring

Organizational Management

Internal Control Policy
An Internal Control Policy identifies how a system of controls should be maintained to safeguard assets, promote operational efficiency, and encourage adherence to prescribed managerial policies.
Performance Review Policy
A Performance Review Policy provides personnel context and transparency into their performance and career development processes.
Information Security Policy
An Information Security Policy establishes the security requirements for maintaining the security, confidentiality, integrity, and availability of applications, systems, infrastructure, and data.
Disciplinary Action
Personnel who violate information security policies are subject to disciplinary action and such disciplinary action is clearly documented in one or more policies.
Information Security Program Review
Management is responsible for the design, implementation, and management of the organization’s security policies and procedures. The policies and procedures are reviewed by management at least annually.
Code of Conduct
A Code of Conduct outlines ethical expectations, behavior standards, and ramifications of noncompliance.

Confidentiality

Data Retention and Disposal Policy
A Data Retention and Disposal Policy specifies how customer data is to be retained and disposed of based on compliance requirements and contractual obligations.
Data Classification Policy
A Data Classification Policy details the security and handling protocols for sensitive data.

Incident Response

Incident Response Plan
An Incident Response Plan outlines the process of identifying, prioritizing, communicating, assigning and tracking confirmed incidents through to resolution.

Risk Assessment

Vendor Due Diligence Review
Vendor SOC 2 reports (or equivalent) are collected and reviewed on at least an annual basis.
Vendor Risk Management Policy
A Vendor Risk Management Policy defines a framework for the onboarding and management of the vendor relationship lifecycle.
Risk Assessment and Treatment Policy
A Risk Assessment and Treatment Policy governs the process for conducting risk assessments to account for threats, vulnerabilities, likelihood, and impact with respect to assets, team members, customers, vendors, suppliers, and partners. Risk tolerance and strategies are also defined in the policy.

Access Security

Access to Product is Restricted
Non-console access to production infrastructure is restricted to users with a unique SSH key or access key
Encryption and Key Management Policy
An Encryption and Key Management Policy supports the secure encryption and decryption of app secrets, and governs the use of cryptographic controls.
Access Control and Termination Policy
An Access Control and Termination Policy governs authentication and access to applicable systems, data, and networks.
Unique Access IDs
Personnel are assigned unique IDs to access sensitive systems, networks, and information

Communications

Terms of Service
Terms of Service or the equivalent are published or shared to external users.
Privacy Policy
A Privacy Policy to both external users and internal personnel. This policy details the company's privacy commitments.