AI Management System
AIMS certification demonstrating responsible development and use of AI systems — governance, risk management, and ethical AI practices.
View certificateAskable Labs runs on Askable’s production platform. The Integrated Management System (IMS) that serves over 3,000 clients across banking, health insurance, and other regulated industries underpins every sample in this catalogue — externally attested under SOC 2 Type II and certified to ISO/IEC 27001:2022, 27701:2019, and 42001:2023.
External attestations and certifications held by Askable apply directly to Askable Labs — the lab runs on Askable’s production platform, not a parallel one. Everything you see below is testing the same IMS.
Certificates marked View are downloadable from the Resources section. The SOC 2 Type II report and penetration test summary are available under MNDA on request.
AIMS certification demonstrating responsible development and use of AI systems — governance, risk management, and ethical AI practices.
View certificateISMS certification confirming Askable meets internationally recognised standards for managing and protecting information security risks.
View certificatePIMS certification demonstrating commitment to protecting personal data and compliance with global privacy regulations including GDPR.
View certificateIndependent auditor report verifying security, availability, and confidentiality controls have operated effectively over a sustained audit period — not just at a single point in time.
Request access (MNDA)General Data Protection Regulation. Lawful basis, data subject rights, DPIA, and cross-border transfer controls embedded in the platform.
Read DPAUK government-backed certification confirming Askable has implemented essential cybersecurity controls against the most common internet-based threats.
View certificateCloud security posture recognition from Wiz for adherence to cloud-native security best practice across AWS workloads.
Read moreCalifornia Consumer Privacy Act compliance. Right to know, right to delete, right to opt out — supported across the platform.
Read CCPA policyAskable is a global SaaS platform for research and capture, trusted by 3,000+ clients in banking, health insurance, and other regulated industries. Recruitment, consent, capture, tagging, review, and delivery are code paths on one audited system.
The certifications above describe that posture viewed through multiple external lenses: SOC 2 Type II, ISO/IEC 27001:2022, 27701:2019, 42001:2023, Cyber Essentials, GDPR, CCPA, and Wiz Cloud Security Excellence — all bound by the IMS.
Public certificates are View-able directly. Reports containing customer-detail (SOC 2 Type II, penetration test) and internal policies are released under MNDA via Request access.
Every request lands with the security team in a single inbox; turnaround is typically <2 business days. Send checklists directly to security@askable.com.
Artificial Intelligence Management System (AIMS) certification demonstrating responsible development and use of AI systems, including governance, risk management, and ethical AI practices.
Information Security Management System (ISMS) certification confirming Askable meets internationally recognised standards for managing and protecting information security risks.
Privacy Information Management System (PIMS) certification demonstrating commitment to protecting personal data and compliance with global privacy regulations including GDPR.
Independent auditor report verifying that Askable's security, availability, and confidentiality controls have been operating effectively over a sustained audit period, not just at a single point in time.
UK government-backed certification confirming Askable has implemented essential cybersecurity controls to protect against the most common internet-based threats and cyberattacks.
Findings of a penetration test performed for Askable Pty Ltd against the Askable web application platform by Acumenis, validating the effectiveness of implemented security controls.
Independent evaluation of my.askable against WCAG 2.2 Level A and AA standards by me2 Accessibility. Voluntary Product Accessibility Template providing detailed conformance information.
Disaster recovery test validating Askable's ability to restore the production database from a snapshot backup following a simulated critical data-loss event.
Master policy governing how the Integrated Management System (IMS) is operated across security, privacy, and AI practices.
Defines how vulnerabilities are discovered, triaged, remediated under SLAs, and verified across production systems.
Rules for the acceptable use and handling of Askable information assets by personnel and contractors.
Standards for the protection of user endpoint devices — encryption, MDM enrolment, screen-lock, patching.
Process for responding to data subject access, deletion, and correction requests under GDPR / CCPA / Australian Privacy Act.
The full Annex A & ISO/IEC 27002:2022 control set, the operational controls under the IMS, and the AI lifecycle controls under ISO/IEC 42001. Every control is owned, documented, evidenced, and reviewed under the internal audit programme — SOC 2 Type II tests their operating effectiveness over the audit window.
Filter by category in the sidebar, or search across all controls.
Production systems can only be remotely accessed by authorised employees via an approved encrypted connection.
Privileged access to databases is restricted to authorised users with a business need.
Processes for acquisition, use, management and exit from cloud services are established in line with the organisation's information security requirements.
Information transfer rules, procedures, or agreements are in place for all types of transfer facilities within the organisation and between the organisation and other parties.
Rules for the effective use of cryptography, including cryptographic key management, are defined and implemented.
Rules to control physical and logical access to information and other associated assets are established and implemented based on business and information security requirements.
The full life cycle of identities is managed — provisioning, modification, review, and de-provisioning.
Allocation and management of authentication information is controlled by a management process, including advising personnel on the appropriate handling of authentication information.
Access rights to information and other associated assets are provisioned, reviewed, modified and removed in accordance with the organisation's topic-specific policy on access control.
The allocation and use of privileged access rights is restricted and managed.
Access to information and other associated assets is restricted in accordance with the established topic-specific policy on access control.
Secure authentication technologies and procedures are implemented based on information access restrictions and the topic-specific policy on access control.
Utility programs capable of overriding system and application controls are restricted and tightly controlled.
Logs that record activities, exceptions, faults and other relevant events are produced, stored, protected and analysed.
Networks, systems and applications are monitored for anomalous behaviour and appropriate actions are taken to evaluate potential information security incidents.
Security measures are implemented when personnel are working remotely to protect information accessed, processed or stored outside the organisation's premises.
Networks and network devices are secured, managed and controlled to protect information in systems and applications.
Security mechanisms, service levels and service requirements of network services are identified, implemented and monitored.
Groups of information services, users and information systems are segregated in the organisation's networks.
Access to external websites is managed to reduce exposure to malicious content.
Information security requirements are identified, specified and approved when developing or acquiring applications.
Principles for engineering secure systems are established, documented, maintained and applied to any information system development activities.
Information relating to information security threats is collected and analysed to produce threat intelligence.
Authentication to production datastores uses authorised secure authentication mechanisms, such as unique SSH key.
System access is restricted to authorised access only.
Passwords for in-scope system components are configured according to the company's policy.
Information security roles and responsibilities are defined and allocated according to the organisation's needs.
The organisation determines the boundaries and applicability of the information security management system to establish its scope, considering external/internal issues, requirements, and interfaces.
An inventory of information and other associated assets, including owners, is developed and maintained.
Personnel and other interested parties return all the organisation's assets in their possession upon change or termination of their employment, contract or agreement.
Appropriate procedures are implemented to protect intellectual property rights.
Off-site assets are protected.
Storage media is managed through its life cycle of acquisition, use, transportation and disposal in accordance with the organisation's classification scheme and handling requirements.
Items of equipment containing storage media are verified to ensure that any sensitive data and licensed software has been removed or securely overwritten prior to disposal or re-use.
Information stored on, processed by or accessible via user endpoint devices is protected.
Protection against malware is implemented and supported by appropriate user awareness.
Necessary competence is determined, persons doing security-affecting work are competent on the basis of education/training/experience, and actions are taken to acquire competence where needed.
Persons doing work under the organisation's control are aware of the information security policy, their contribution to the ISMS, and the implications of non-conformance.
Background verification checks on all candidates are carried out prior to joining the organisation and on an ongoing basis, proportional to business requirements and risk.
A disciplinary process is formalised and communicated to take actions against personnel who have committed an information security policy violation.
Information security responsibilities and duties that remain valid after termination or change of employment are defined, enforced and communicated.
Confidentiality or non-disclosure agreements reflecting the organisation's needs are identified, documented, regularly reviewed and signed by personnel and other relevant interested parties.
Processes needed to meet ISMS requirements are planned, implemented and controlled, with planned changes reviewed and externally provided processes controlled.
Premises are continuously monitored for unauthorised physical access.
Protection against physical and environmental threats — such as natural disasters and other intentional or unintentional physical threats to infrastructure — is designed and implemented.
Clear desk rules for papers and removable storage media, and clear screen rules for information processing facilities, are defined and appropriately enforced.
Personnel and relevant interested parties receive appropriate information security awareness, education and training, with regular updates of policy and procedures.
A formalised whistleblower policy is established, with an anonymous communication channel for users to report potential issues or fraud concerns.
Formal policies outline the requirements for vulnerability management and system monitoring.
Datastores housing sensitive customer data are encrypted at rest.
Penetration testing is performed at least annually. A remediation plan is developed and changes are implemented to remediate vulnerabilities in accordance with SLAs.
Read and write access to source code, development tools and software libraries is appropriately managed.
Rules for the secure development of software and systems are established and applied.
Secure coding principles are applied to software development.
Security testing processes are defined and implemented in the development life cycle.
Development, testing and production environments are separated and secured.
Test information is appropriately selected, protected and managed.
The organisation's approach to managing information security is reviewed independently at planned intervals, or when significant changes occur.
Cybersecurity insurance is maintained to mitigate the financial impact of business disruptions.
A configuration management procedure ensures that system configurations are deployed consistently throughout the environment.
ICT readiness is planned, implemented, maintained and tested based on business continuity objectives and ICT continuity requirements.
Backup copies of information, software and systems are maintained and regularly tested in accordance with the agreed topic-specific backup policy.
The use of resources is monitored and adjusted in line with current and expected capacity requirements.
Configurations, including security configurations, of hardware, software, services and networks are established, documented, implemented, monitored and reviewed.
When the organisation determines the need for changes to the ISMS, the changes are carried out in a planned manner.
Procedures and measures are implemented to securely manage software installation on operational systems.
Internal audits are conducted at planned intervals to provide information on whether the ISMS conforms to requirements and is effectively implemented and maintained.
An audit programme is planned, established, implemented and maintained — frequency, methods, responsibilities, planning requirements and reporting.
When a nonconformity occurs, the organisation reacts, evaluates causes, implements actions, reviews effectiveness, and changes the ISMS if necessary.
Legal, statutory, regulatory and contractual requirements relevant to information security and the organisation's approach to meet them are identified, documented and kept up to date.
The organisation establishes, implements, maintains and continually improves an information security management system.
Top management ensures that responsibilities and authorities for ISMS-relevant roles are assigned and communicated within the organisation.
The organisation determines what is monitored and measured, the methods, when, by whom, and analyses the results to evaluate ISMS performance and effectiveness.
The organisation continually improves the suitability, adequacy and effectiveness of the ISMS.
Management requires all personnel to apply information security in accordance with established policy, topic-specific policies and procedures.
The organisation establishes and maintains contact with special interest groups, security forums and professional associations.
Operating procedures for information processing facilities are documented and made available to personnel who need them.
Relevant information security requirements are established and agreed with each supplier based on the type of supplier relationship.
The organisation plans and prepares for managing information security incidents by defining, establishing and communicating incident management processes, roles and responsibilities.
The organisation assesses information security events and decides whether to categorise them as information security incidents.
The organisation plans how to maintain information security at an appropriate level during disruption.
A mechanism is provided for personnel to report observed or suspected information security events through appropriate channels in a timely manner.
The organisation determines and provides the resources needed for the establishment, implementation, maintenance and continual improvement of the ISMS.
Information security is integrated into project management.
When planning the ISMS, the organisation considers issues and requirements to determine the risks and opportunities to address — ensuring intended outcomes, preventing undesired effects, and achieving continual improvement.
Information security risk assessments are performed at planned intervals or when significant changes are proposed or occur. Results are retained as documented information.
Documented information of the results of information security risk treatment is retained.
The organisation directs, monitors and reviews the activities related to outsourced system development.
Rules for the acceptable use and procedures for handling information and other associated assets are identified, documented and implemented.
Information is classified according to the information security needs of the organisation based on confidentiality, integrity, availability and relevant interested party requirements.
An appropriate set of procedures for information labelling is developed and implemented in accordance with the information classification scheme adopted by the organisation.
Records are protected from loss, destruction, falsification, unauthorised access and unauthorised release.
Information stored in information systems, devices or in any other storage media is deleted when no longer required.
Data masking is used in accordance with the organisation's topic-specific policy on access control and other related topic-specific policies, and business requirements, taking applicable legislation into consideration.
Data leakage prevention measures are applied to systems, networks and any other devices that process, store or transmit sensitive information.
The organisation identifies and meets the requirements regarding the preservation of privacy and protection of PII according to applicable laws and regulations and contractual requirements.
Business Continuity and Disaster Recovery Plans are in place that outline communication plans in order to maintain information security continuity in the event of the unavailability of key personnel.
The current subprocessor inventory. Each entry names the function performed, the region of processing, and a description of the data class touched.
Notify-on-change. Partner accounts receive 30-day advance notification of any addition or removal from this list.
Cloud-hosted database service used to store and manage platform data — participant profiles, client account information, screener responses, study configurations, and research session metadata.
Cloud infrastructure provider that hosts the Askable platform and securely stores personal data including session recordings, participant files, and application data. All primary data processing and storage occurs within Australian AWS regions.
Cloud infrastructure and AI services provider used to support platform hosting, data storage, and operational services. Where AI-powered features are enabled, also processes prompt inputs and outputs to deliver generative AI functionality.
Monitoring and logging platform used to track application performance, detect errors, and maintain platform reliability. May process operational metadata such as anonymised request logs and system events to support incident resolution and service improvement.
Customer messaging platform that provides in-app live chat and support communications for clients, participants, and researchers. Processes contact details and message content to facilitate real-time support and help-centre interactions.
Electronic signature platform used to facilitate the signing and secure storage of non-disclosure agreements. Processes signatory names and signature data for participants and researchers prior to research sessions.
Large language model provider that powers AI features within the platform, including AI Moderated Interviews, automated insight generation, and research analysis. Processes participant responses, session transcripts, and research data where the client chooses to use AI-powered features.
Large language model provider that powers AI features within the platform, including AI Moderated Interviews, automated insight generation, and research analysis. Processes participant responses, session transcripts, and research data where the client chooses to use AI-powered features.
Speech-to-text service used to generate written transcripts from audio and video recordings captured during Askable Sessions. Processes participant and researcher voice data from recorded research interviews.
Real-time speech recognition provider used to convert participant voice responses into text during AI Moderated Interviews. Processes audio data from participants where the client chooses to use the AI Moderation feature.
Voice synthesis provider that generates natural-sounding speech for the AI Moderator agent during AI Moderated Interviews. Processes interview questions and follow-up prompts to deliver a conversational research experience across 15+ languages.
Real-time video and audio communication platform that powers Askable Sessions for remote research interviews. Processes audio/video streams, screen-sharing data, and session recordings for facilitators, participants, and observers.
Secure authentication and identity management platform that handles login, registration, and SSO for clients, researchers, and participants. Processes user credentials, email addresses, and access tokens to manage platform access.
Cloud communications provider used to send SMS notifications and reminders to research participants — session confirmations, scheduling updates, and study invitations. Processes participant phone numbers and message content.
Transactional email delivery service used to send platform-generated emails such as session confirmations, scheduling links, and account notifications. Processes recipient email addresses and message content.
Email marketing platform used to send marketing communications such as product updates, company updates, event notifications, newsletters, and promotions.
Digital gift card provider used to deliver incentive payments to research participants upon study completion. Processes participant names, email addresses, and payment preference details to issue and track gift card rewards.
Messaging platform used for internal team communications and, where opted in by the client, as a direct communication channel between Askable and the client. May process client contact details, project updates, and research coordination messages.
Work management platform used to coordinate research project delivery and internal workflows. May process client contact details, project briefs, and scheduling information in the context of managed research services such as Project Delivery.
Workflow orchestration platform that enables reliable background jobs and multi-step processes with built-in retries and observability. Orchestrates platform operations such as participant matching, notification delivery, and AI analysis pipelines that may involve personal data in transit.
Serverless vector database that provides fast, scalable vector search and full-text search capabilities for AI-powered features. Stores and retrieves vectorised representations of research data to power semantic search across sessions, transcripts, and insights within Askable AI and Industry Streams.
Australian parent entity responsible for the provision of the Askable platform and services, technical support, and resourcing on behalf of Askable Limited (UK) and Askable Inc. (USA). Processes all categories of personal data described in the Data Processing Addendum in connection with platform operations.
Material changes to the Trust Center: certification milestones, audit completions, subprocessor additions and removals, policy revisions. Reverse chronological.
Subscribe via security@askable.com.
Independent surveillance audit of the ISMS completed with zero major nonconformities. Audit report logged in the IMS evidence register.
First-issue certification of the AI Management System under ISO/IEC 42001:2023, covering responsible development of AI features across the Askable platform.
Added Turbopuffer as a subprocessor for vector and full-text search powering AI features. Hosted in Australia. 30-day notification window observed.
New SOC 2 Type II report covering the audit window 1 Nov 2024 – 31 Oct 2025 is available under MNDA. Bridge letter available for the gap to current date.
Independent VPAT assessment of my.askable against WCAG 2.2 Level A and AA published by me2 Accessibility. Identified barriers are tracked in the public roadmap.
Annual review of subprocessor inventory completed under the IMS change-management policy. Two providers retired, one (Turbopuffer) added in January 2026.
PIMS recertification audit completed. Privacy management system controls reviewed and certified for a further three-year cycle.
Cyber Essentials certification issued by an NCSC-accredited certification body covering the production estate and corporate endpoints.
Third-party penetration test of the Askable web application platform completed by Acumenis. Findings remediated under documented SLA. Summary report available on request.
Cloud security posture recognition from Wiz for adherence to cloud-native security best practice across our AWS workloads.
Information Security, Privacy and Artificial Intelligence Policy revised and republished. Establishes lifecycle controls for AI features in advance of ISO 42001 certification.
California Consumer Privacy Act compliance programme formalised, including right-to-know, right-to-delete, and right-to-opt-out workflows.
Migrated authentication and identity management to Kinde. Region: Australia. 30-day partner notification observed.
Added Anthropic and OpenAI as subprocessors for opt-in AI features (AI Moderated Interviews, automated insight generation). Per-brief opt-in enforced at the data egress layer.
Inaugural SOC 2 Type II attestation covering Security, Availability, and Confidentiality Trust Services Criteria.
ISMS transitioned from ISO/IEC 27001:2013 to the 2022 revision. Annex A control mapping updated across the IMS.
If your standard intake form has 200 questions, most are answered across the Overview, Controls, Subprocessors and Resources sections.
Skip the form: send your security checklist to security@askable.com.
Askable, the parent company. Askable Labs runs on Askable's production platform, so every certification and attestation listed on the trust centre applies directly to the lab's work.
Yes. The current SOC 2 Type II report is available under MNDA. Submit a request through the form on this page and the security team will provide the report and any bridge letter applicable to the gap between report windows.
Primary data processing and storage occurs within Australian AWS regions. A subset of subprocessors operate in the USA — see the Subprocessors tab for the full list and region per provider. Region is configurable per partnership; cross-region transfers require explicit partner authorisation.
No. Participant material is captured, structured, and delivered to partners under the brief's consent scope. The platform enforces this at the data-egress layer.
Right to know, right to delete, right to correct, right to opt out — supported across the platform. Requests are handled under the Data Subject Rights Policy (available on the Resources tab) and tracked in the IMS.
Yes. Withdrawal is supported post-delivery. The end-to-end pathway includes cryptographic destruction of source material on Askable's side and a relayed request to the partner who received the delivery.
Role-scoped, least-privilege, SSO + MFA via Kinde. Every privileged action is logged with actor, action, and resource. Reviewer access is brief-scoped and revocable. Privileged production access requires a documented business need.
Documented incident-response plan operating under the IMS. Material partner-affecting incidents are notified per the partnership agreement and per the SOC 2 / ISO 42001 / ISO 27001 obligations. Incident severity, timeline, root cause and remediation are recorded.
Yes — annually, by an independent third party (Acumenis). The summary report is available under MNDA on the Resources tab. Remediation is tracked under documented SLAs in the vulnerability management programme.
All datastores housing sensitive customer data are encrypted at rest. Production traffic is TLS in transit. Cryptographic key management is governed by the Information Security, Privacy and AI Policy.
Partner accounts receive 30-day advance notification of any addition or removal from the subprocessor list. Material partner-affecting changes are also notified at the brief level.
Yes. AI Moderated Interviews, automated insight generation, and AI-assisted analysis are per-brief opt-in. The platform enforces opt-in at the data egress layer — no participant material is sent to an LLM subprocessor unless the brief has been configured to do so.
Both are held. Askable is certified to ISO/IEC 27001:2022 (ISMS) and ISO/IEC 27701:2019 (PIMS). Certificates are downloadable from the Resources tab.
Yes. Responsible disclosure submissions can be sent to security@askable.com. The vulnerability management policy (Resources tab) describes triage, SLAs, and acknowledgement.
Vendor reviews, certificate requests, SOC 2 report under MNDA, or anything you need to clear an enterprise security review.