Grammarly has successfully completed SOC 2 (Type 1) and SOC 2 (Type 2) examinations and received corresponding reports. These examinations validate that Grammarly meets the strict SOC 2 standards for security, availability, confidentiality, and privacy of our customers’ data.
Grammarly’s SOC 3 report is a publicly available version of the SOC 2 (Type 2) report. You can review this report here.
This is an international standard for information security management systems. Obtaining this certification confirms that Grammarly meets industry-standard requirements for establishing, implementing, maintaining, and continually improving an information security management system. Grammarly’s ISO 27001 certificate can be found here.
This certification sets forth security requirements for cloud service providers and customers. It shows that Grammarly adheres to industry standards concerning the provision and use of cloud services. You can find Grammarly’s ISO 27017 certificate here.
This international standard covers protection of users’ personal information. Grammarly meeting this standard demonstrates our commitment to safeguarding your data. You can follow this link to review Grammarly’s ISO 27018 certificate.
Cloud Security Alliance is a nonprofit organization with the goal of promoting best practices in relation to cloud computing. Grammarly is a member of CSA and has completed the CSA STAR Level 1 assessment. You can review Grammarly’s Consensus Assessments Initiative Questionnaire for more information about our security practices.
Grammarly is compliant with the Payment Card Industry Data Security Standard. Grammarly’s attestation confirms that your payment information is protected in accordance with industry standards.
The Health Insurance Portability and Accountability Act of 1996 establishes a set of standards to protect sensitive health information. Grammarly is compliant with HIPAA Security, Privacy, and Breach Notification rules. If you are required to sign a BAA in order to comply with HIPAA, please submit a request here.