Neural Payments | Trust Center
Neural Payments Trust Center
Welcome to the Neural Payments Trust Center. We are committed to protecting the confidentiality, integrity, and availability of our customer's data. This site details how we accomplish this, our industry compliance, and provides the ability to request our security documentation.
See resources

Resources

Our latest security and compliances resources, reports, and documentation.

SOC 2 Type 2 Report

Evidence period April 14, 2024 - April 13, 2025.

SOC 2 Type 2 Bridge Letter

Quarterly SOC bridge letter dated January 12, 2026

PCI-DSS v4.0.1 SAQ-D Attestation of Compliance

Updated March 25, 2025

Standard Information Gathering (SIG) Questionnaire

Updated July 1, 2025

High Level System Diagram

Updated May 2, 2025.

Penetration Test Attestations

Penetration Tests completed January 27, 2026.

Certificate of Insurance-Directors, Fiduciary, Cyber Liability, and Theft

Certificate of Insurance-General Liability, Data Breach, and Failsafe

Privacy Policy

Information Security Policy

View all

Monitoring

Continuously monitored by Secureframe
View all

Subprocessors

The Neural Payments solution employs the services of the following subprocessors.

Auth0

Single Sign On Authentication

FIS Global

Neural Payments utilizes the FIS-NYCE Payment Processing service.

Google Cloud

Cloud Services

PayPal

Payment Endpoint Solution

Pidgin

FedNow Connectivity via API Integration

Prizeout

Payment Endpoint Solution

SendGrid

Email API

Short.io

Link Shortener

Stream.io

Streaming Updates to UI

Compliance

Neural Payments complies with the following frameworks.

SOC 2 Type 2

PCI

PCI-DSS v4.0.1

FAQs

Monitoring

Change Management

Secure Development Policy
A Secure Development Policy defines the requirements for secure software and system development and maintenance.
Software Change Testing
Software changes are tested prior to being deployed into production.
Production Data Use is Restricted
Production data is not used in the development and testing environments, unless required for debugging customer issues.
Change Management Policy
A Change Management Policy governs the documenting, tracking, testing, and approving of system, network, security, and infrastructure changes.
Configuration and Asset Management Policy
A Configuration and Asset Management Policy governs configurations for new sensitive systems

Availability

Backup Restoration Testing
Backed-up data is restored to a non-production environment at least annually to validate the integrity of backups.
Business Continuity and Disaster Recovery Policy
Business Continuity and Disaster Recovery Policy governs required processes for restoring the service or supporting infrastructure after suffering a disaster or disruption.
Automated Backup Process
Full backups are performed and retained in accordance with the Business Continuity and Disaster Recovery Policy.

Organizational Management

Internal Control Policy
An Internal Control Policy identifies how a system of controls should be maintained to safeguard assets, promote operational efficiency, and encourage adherence to prescribed managerial policies.
Roles and Responsibilities
Information security roles and responsibilities are outlined for personnel responsible for the security, availability, and confidentiality of the system.
Code of Conduct
A Code of Conduct outlines ethical expectations, behavior standards, and ramifications of noncompliance.
Disciplinary Action
Personnel who violate information security policies are subject to disciplinary action and such disciplinary action is clearly documented in one or more policies.
Information Security Policy
An Information Security Policy establishes the security requirements for maintaining the security, confidentiality, integrity, and availability of applications, systems, infrastructure, and data.
Security Awareness Training
Internal personnel complete annual training programs for information security to help them understand their obligations and responsibilities related to security.
Background Checks
Background checks or their equivalent are performed before or promptly after a new hires start date, as permitted by local laws.
Acceptable Use Policy
An Acceptable Use Policy defines standards for appropriate and secure use of company hardware and electronic systems including storage media, communication tools and internet access.
Performance Review Policy
A Performance Review Policy provides personnel context and transparency into their performance and career development processes.
Internal Control Monitoring
A continuous monitoring solution monitors internal controls used in the achievement of service commitments and system requirements.

Confidentiality

Data Classification Policy
A Data Classification Policy details the security and handling protocols for sensitive data.
Data Retention and Disposal Policy
A Data Retention and Disposal Policy specifies how customer data is to be retained and disposed of based on compliance requirements and contractual obligations.

Vulnerability Management

Vulnerability and Patch Management Policy
A Vulnerability Management and Patch Management Policy outlines the processes to efficiently respond to identified vulnerabilities.

Incident Response

Incident Response Plan
An Incident Response Plan outlines the process of identifying, prioritizing, communicating, assigning and tracking confirmed incidents through to resolution.

Risk Assessment

Risk Assessment
Formal risk assessments are performed, which includes the identification of relevant internal and external threats related to security, availability, confidentiality, and fraud, and an analysis of risks associated with those threats.
Risk Register
A risk register is maintained, which records the risk mitigation strategies for identified risks, and the development or modification of controls consistent with the risk mitigation strategy.
Risk Assessment and Treatment Policy
A Risk Assessment and Treatment Policy governs the process for conducting risk assessments to account for threats, vulnerabilities, likelihood, and impact with respect to assets, team members, customers, vendors, suppliers, and partners. Risk tolerance and strategies are also defined in the policy.
Vendor Risk Management Policy
A Vendor Risk Management Policy defines a framework for the onboarding and management of the vendor relationship lifecycle.

Network Security

Endpoint Security
Company endpoints are managed and configured with a strong password policy, anti-virus, and hard drive encryption
Network Security Policy
A Network Security Policy identifies the requirements for protecting information and systems within and across networks.

Access Security

Access Control and Termination Policy
An Access Control and Termination Policy governs authentication and access to applicable systems, data, and networks.
Asset Inventory
A list of system assets, components, and respective owners are maintained and reviewed at least annually
Encryption-at-Rest
Service data is encrypted-at-rest.
Access to Product is Restricted
Non-console access to production infrastructure is restricted to users with a unique SSH key or access key

Physical Security

Physical Security Policy
A Physical Security Policy that details physical security requirements for the company facilities is in place.

Communications

Privacy Policy
A Privacy Policy to both external users and internal personnel. This policy details the company's privacy commitments.
Description of Services
Descriptions of the company's services and systems are available to both internal personnel and external users.