Free Site Registration

Deloitte & Touche Issues SOC 2 Report on TORA Security Controls

Traders Magazine Online News, September 11, 2017

John D'Antona Jr.

TORA, provider of cloud-based order and execution management system (OEMS), announced that the company has undergone a Service Organization Control 2SM (SOC 2) examination resulting in a Certified Public Accountant’s report stating that TORA has designed and implemented controls to meet the criteria for the security principle set forth in TSP section 100, 2016 Trust Services Principles (TSP) and Criteria for Security, Availability, Processing Integrity, Confidentiality, and Privacy over its TORA OEMS and TORA Portfolio and Risk Management System (PRMS). The engagement was performed by Deloitte & Touche LLP.

A SOC 2 report is designed to meet the needs of existing or potential clients who need assurances about the effectiveness of controls in place at a service organization that are relevant to the security, availability, or processing integrity of the system used by the service organization to process clients’ information, or the confidentiality or privacy of that information.

"We are pleased that our SOC 2 report has shown that we have the appropriate controls in place to mitigate security risks,” said Robert Dykes, CEO of TORA. “This examination provides independent assurance to clients that TORA has robust systems and processes in place to satisfy the SOC 2 standards.”

The following Trust Services Principles and related criteria have been developed by the American Institute of CPAs (AICPA) and the Canadian Institute of Chartered Accountants (CICA) for use by practitioners in the performance of trust services engagements:

• Security. The system is protected against unauthorized access (both physical and logical).

• Availability. The system is available for operation and use as committed or agreed.

• Processing integrity. System processing is complete, accurate, timely and authorized.

• Confidentiality. Information designated as confidential is protected as committed or agreed.

• Privacy. Personal information is collected, used, retained, disclosed and destroyed in conformity with the commitments in the entity’s privacy notice and with criteria set forth in generally accepted privacy principles issued by the AICPA and CICA.

“As asset managers continue to outsource their technology, SOC 2 examination will become necessary for vendors offering cloud-based and managed service solutions,” said Spencer Mindlin, Analyst at Aite Group. “The industry is increasingly keen to see proof of internal control policies and practices related to security, so vendors that provide such evidence will be in good stead for future evaluation.”

For more information on related topics, visit the following channels:

Comments (0)

Add Your Comments:

You must be registered to post a comment.

Not Registered? Click here to register.

Already registered? Log in here.

Please note you must now log in with your email address and password.