At Coreforce, transparency and security are foundational to how we operate. This Trust Center is designed to give you real-time access to our security, privacy, and compliance posture—so you can make informed decisions with confidence.
Here, you’ll find detailed documentation on our certifications (including SOC 2, ISO 27001, and others), infrastructure hosted on AWS and Azure, and our internal policies covering encryption, vulnerability management, incident response, and data retention.
We’re proud to support public safety organizations with solutions like digital evidence management, real-time crime center integration, and jail management platforms. These services are backed by secure APIs, strong authentication protocols, and a privacy-first approach.
If you have any questions or need additional information, our GRC & Privacy team is here to help.
Thank you for trusting Coreforce.
— The Coreforce Security & Privacy Team
Reports
Reports
We may provide security-related reports upon request.
Subprocessors
Subprocessors
- What security training and screening does Coreforce require for personnel?
- What are Coreforce's backup and disaster recovery practices?
- What is Coreforce's incident response process?
- How does Coreforce monitor for security threats and suspicious activity?
- How is customer data protected at rest and in transit?







