Bead AI Trust Center
Bead AI is in compliance with security best practices, has implemented and is monitoring comprehensive controls, and maintains policies to outline its security procedures.
Compliance
Resources
Controls
FAQs
We perform reviews of SOC 2 reports from service providers at onboarding and annually to assess the appropriateness of scope and impact of identified exceptions. For critical vendors without SOC 2 reports but with access to company data, regularly scheduled risk assessments are performed to evaluate performance and compliance with security commitments.
We carry out background and/or reference checks on all new employees and contractors prior to joining in accordance with relevant laws, regulations and ethics. We utilize a pre-hire checklist to ensure the hiring manager has assessed the qualification of candidates to confirm they can perform the necessary job requirements.
Periodic tests are performed by authorized personnel that could include tabletop sessions, disaster simulations, or other realistic scenarios. Following each test, an assessment report is created indicating the success of the exercise and required corrective actions.