Loading...
Loading...
TrueNorth WCI™ enforces Zero Trust at every layer. No request is inherently trusted — every access decision is identity-verified, context-evaluated, and least-privilege enforced, regardless of network origin or session state.
Every request is authenticated against a verified identity. MFA and SSO via SAML 2.0/OIDC validate context before access is granted. No implicit trust from prior sessions.
Authorization is computed per-request against RBAC policies spanning platform and organization roles. Users receive the minimum permissions required for the specific action. Privilege escalation requires explicit re-authentication.
Each tenant's data is isolated through database scoping, tenant-aware application logic, and key-management controls. Cross-tenant access is blocked by design and enforcement controls. Sub-processor traffic is restricted to verified encrypted channels.
Sessions are evaluated against behavioral and threshold-based controls. Anomalous access patterns can trigger additional verification or session controls. Security monitoring remains continuous — trust is never assumed, always re-earned.
For Canadian organizations, data residency is not a preference — it is frequently a regulatory requirement. TrueNorth WCI™ is designed to meet these obligations by default.
Canadian deployments are configured for Canadian data residency objectives, including regional infrastructure controls for application and data services.
Each organization operates within a logically isolated tenant environment. Data is segregated at the database level with tenant-scoped access controls and encryption safeguards.
For US-based organizations, deployment and data handling are configured to meet applicable US data protection requirements. Cross-border data transfers follow documented contractual controls where required.
| Framework | Jurisdiction | Platform Alignment |
|---|---|---|
| PIPEDA | Canada (Federal) | Consent management, data minimization, breach notification, right of access, data portability |
| CPPA (Bill C-27) | Canada (Proposed) | Designed to accommodate anticipated requirements including algorithmic transparency and enhanced consent |
| Provincial Privacy Acts | AB, BC, QC | Substantially similar legislation compliance for Alberta (PIPA), British Columbia (PIPA), and Quebec (Law 25) |
| CCPA / CPRA | California, USA | Consumer rights, data deletion, opt-out mechanisms, and privacy notice requirements |
| State Privacy Laws | Various US States | Coverage references include Virginia (VCDPA), Colorado (CPA), Connecticut (CTDPA), Utah (UCPA), and subsequent state frameworks |
| GDPR Principles | International | Data export, right to erasure, consent management, and data processing records — aligned with GDPR principles for multinational clients |
Architecture aligned with AICPA Trust Services Criteria across Security, Availability, Confidentiality, Processing Integrity, and Privacy. Formal audit in progress.
Information security management controls aligned with ISO 27001 Annex A — including A.10 (Cryptography), A.9 (Access Control), and A.12 (Operations Security).
Cryptographic key-management controls are designed to align with FIPS 140-3 expectations where applicable to deployment environments and managed key services.
Platform controls are designed and mapped against Canada's Personal Information Protection and Electronic Documents Act principles, including consent, data minimization, breach notification, and right of access.
Platform accessibility is designed to align with Web Content Accessibility Guidelines Level AA across public-facing and authenticated interfaces.
Zero Trust Architecture implementation aligned with NIST SP 800-207 principles: verify explicitly, use least-privilege access, and assume breach at every layer.
Behavioral analytics and threshold-based detection continuously profile activity patterns and surface anomalies before they become incidents.
The TrueNorth WCI™ whistleblower system is designed for structural anonymity in the application layer. Reports are submitted through an anonymous channel that avoids collecting direct reporter identity fields, session linkage, and device-fingerprint telemetry in the submission workflow. This design reduces re-identification risk and supports defensible confidentiality controls for sensitive reporting.
Our team can provide detailed security documentation, SOC 2 alignment documentation, data processing agreements, and responses to vendor security questionnaires.
© 2026 TrueNorth Workforce Compliance Intelligence Inc. All rights reserved. TrueNorth WCI™ is a registered trademark. Patent pending. Security certifications and compliance alignments described on this page represent the architectural design targets and operational practices of the platform. Specific certification status and audit reports are available upon request under NDA. This page does not constitute a contractual commitment. Actual security controls are governed by the applicable Master Services Agreement.