The TARA Group Trust Center

Start your security review
View & download sensitive information
Ask for information
ControlK

Welcome to The TARA Group Trust Center. Our commitment to data privacy and security is embedded in every part of our business. Use our Trust Center to learn about our security posture and request access to our security documentation.

Documents

Featured Documents

COMPLIANCESOC 2 Type 2
Responsible Disclosure
Application Penetration Testing
Software Development Lifecycle
View more

BC/DR

We have a business continuity plan in place to ensure that we can continue to operate in the event of a disaster.

ESG

We prioritize and take environmental, social, and governance (ESG) considerations seriously in our operations and decision-making processes.

AI

We take the usage of AI seriously in our organization and work to ensure security and reliability of the AI.

The TARA Group Trust Center Updates

Completed a SOC 2® Type II Audit

Copy link
Compliance

Strengthening Our Commitment to Security

At The TARA Group, LLC, security is more than a compliance requirement: it’s a foundational value that guides how we build, operate, and protect the trust of our clients, partners, and stakeholders. We are proud to announce the successful completion of our SOC 2® Type II audit, conducted by Prescient Assurance, LLC.

Covering the period from April 1, 2025 through July 2, 2025, the audit evaluated the design and operating effectiveness of our controls against the Security category of the AICPA’s Trust Services Criteria. This independent validation confirms that The TARA Group’s security practices, policies, and systems meet one of the industry’s most respected standards for safeguarding information.

The audit scope included the flagship products offered by The TARA Group, LLC that power all of our operating companies, underscoring our unified approach to risk management, incident prevention, and operational resilience. Completing a SOC 2® Type II examination demonstrates that:

  • Our security controls are not only well-designed but also operate effectively over time.
  • We proactively monitor, maintain, and improve our defenses against emerging threats.
  • We align our internal processes with recognized best practices for protecting sensitive data.

Accessing Our SOC 2® Report

Interested clients, partners, and qualified third parties may request an Attestation Letter or Full SOC 2® Type II Report (typically under NDA).

To request a copy, please reach out to your Client Services contact or email security@thetara.group.

The completion of this audit marks an important milestone in our continuous improvement journey and reflects our unwavering dedication to transparency, accountability, and operational excellence in information security.