Security and Compliance

We always put customer data protection first and are committed to protecting the system and your data in the best way.

Data protection principles: COOHOM has developed principles for data protection based on the most extensive data protection laws, regulations, and industry standards. All customer data is processed in strict compliance with these principles to protect customer data.

Data protection strategy: Adopt reasonable management and technical safeguard measures to ensure the security of the entire life cycle of data.

Data technical measures: COOHOM protects customer data from unauthorized access, use, or disclosure through various measures such as identity authentication and access control, data encryption, and data backup and recovery mechanisms.


COOHOM establishes internal security control framework in accordance with internationally recognized information security and IT management standards, follows data protection principles, and fully integrates it into products or services. You can enjoy the COOHOM service without worrying about security issues.

We will regularly invite independent third-party organizations to assess security risks to ensure its compliance. COOHOM has obtained the following compliance certificates.

ISO/IEC 27001:2013

ISO 27001 is a widely accepted international standard that specifies requirements for the management of information security systems. The standard aims to establish a complete information security management framework and to promote continuous improvement and optimization of enterprise information security in accordance with the PDCA cycle mechanism.

Certified compliance is not just acknowledgment, it's a promise to you. Passing this certification means that we have sufficient information security risk identification and control capabilities and can provide safe and reliable services to customers around the world. We will follow standards and continue to improve and strengthen security management measures, and regular independent third-party audits, to ensure that it is continuously monitored and improved.

AICPA SOC 2 Report

The SOC2 audit is an independent, third-party audit performed based on relevant guidelines developed by the American Institute of Certified Public Accountants (AICPA) for the appropriateness of controls related to the security, availability, and confidentiality of the COOHOM service system.

Through this authentication service, it indicates that we have a reliable system security design that can guarantee the security, availability, and confidentiality of the services provided. We will regularly accept third-party audits to ensure compliance with the requirements of this standard.

Our user organizations, independent auditors, regulatory agencies, company shareholders, and other parties can evaluate the design appropriateness and operational effectiveness of COOHOM based on the report.

If a new compliance certificate is available, it will be updated here.

If you need the above certificate and report, you can send an email to us.