Trust Center

Start your security review
View & download sensitive information
Ask for information
Search items
ControlK

Overview

Welcome to Echo AI's Trust Center. Our commitment to data privacy and security is embedded in every part of our business. Use this Trust Center to learn about our security posture and request access to our security documentation.

Please note that prior to 2024, Echo AI was known as "Pathlight". Many of the documents found here still use that name and are in the process of being migrated. The legal name of the company has never changed (TTSF, Inc.)

Compliance

PCI DSS Logo
PCI DSS
SOC 2 Logo
SOC 2
Start your security review
View & download sensitive information
Ask for information

EchoAI is reviewed and trusted by

Stitch Fix-company-logoStitch Fix
CLEAR-company-logoCLEAR
Ancestry-company-logoAncestry
Kia America-company-logoKia America
Twilio-company-logoTwilio
Wine Enthusiast-company-logoWine Enthusiast
Centerfield-company-logoCenterfield

Documents

Pentest Report
PCI DSS
SOC 2
SIG Lite
Data Processing Agreement
Master Services Agreement
PCI DSS
SOC 2 Report
Data Erasure
Acceptable Use Policy
Access Control Policy
Asset Management Policy
Backup Policy
Business Continuity Policy
Data Classification Policy
Encryption Policy
General Incident Response Policy
Information Security Policy
Other Policies
Password Policy
Physical Security
Risk Management Policy
Software Development Lifecycle
Vulnerability Management Policy

Risk Profile

Data Access LevelInternal
Impact LevelModerate
Recovery Time Objective24 hours
View more

Product Security

Audit Logging
Data Security
Integrations
View more

Reports

PCI DSS
Pentest Report
SOC 2 Report

Self-Assessments

SIG Lite

Data Security

Access Monitoring
Backups Enabled
Data Erasure
View more

App Security

We take application security seriously and are putting together a program to monitor internal apps.

Data Privacy

Data Breach Notifications
Data Into System
Data Privacy Officer
View more

Access Control

Data Access
Logging
Password Security

Infrastructure

Status Monitoring
Amazon Web Services
Anti-DDoS
View more

Endpoint Security

Disk Encryption
Endpoint Detection & Response

Network Security

Data Loss Prevention
Firewall
Virtual Private Cloud

Corporate Security

We implement internal measures and practices to maintain a high standard of security.

Policies

Acceptable Use Policy
Access Control Policy
Asset Management Policy
View more

Security Grades

We are constantly monitoring the security of our website. We will post our grades from public security rating agencies when they become available.

Powered bySafeBase Logo