Loading...
Loading...
TrueNorth WCI™ enforces Zero Trust at every layer. No request is inherently trusted — every access decision is identity-verified, context-evaluated, and least-privilege enforced, regardless of network origin or session state.
Every request is authenticated against a verified identity. MFA, SSO via SAML 2.0/OIDC, and adaptive risk scoring combine to validate context before access is granted. No implicit trust from prior sessions.
Authorization is computed per-request against the six-role RBAC hierarchy. Users receive the minimum permissions required for the specific action. Privilege escalation requires explicit re-authentication.
Each tenant's data is isolated at the database, encryption key, and application layer. Cross-tenant access is architecturally impossible — not just policy-restricted. Sub-processor traffic flows through verified, encrypted channels only.
Sessions are continuously evaluated against behavioral baselines. Anomalous access patterns trigger automated step-up authentication or session termination. UEBA monitors in real time — trust is never assumed, always re-earned.
For Canadian organizations, data residency is not a preference — it is frequently a regulatory requirement. TrueNorth WCI™ is designed to meet these obligations by default.
Production data is hosted on Canadian-based infrastructure. Database servers, application servers, and backup systems reside within Canadian borders to satisfy provincial and federal data residency requirements.
Each organization operates within a logically isolated tenant environment. Data is segregated at the database level with tenant-specific encryption keys. No cross-tenant data access is architecturally possible.
For US-based organizations, data is hosted in accordance with applicable US data protection requirements. Cross-border data transfers between Canadian and US infrastructure follow documented data transfer agreements.
| Framework | Jurisdiction | Platform Alignment |
|---|---|---|
| PIPEDA | Canada (Federal) | Consent management, data minimization, breach notification, right of access, data portability |
| CPPA (Bill C-27) | Canada (Proposed) | Designed to accommodate anticipated requirements including algorithmic transparency and enhanced consent |
| Provincial Privacy Acts | AB, BC, QC | Substantially similar legislation compliance for Alberta (PIPA), British Columbia (PIPA), and Quebec (Law 25) |
| CCPA / CPRA | California, USA | Consumer rights, data deletion, opt-out mechanisms, and privacy notice requirements |
| State Privacy Laws | Various US States | Full compliance with Virginia (VCDPA), Colorado (CPA), Connecticut (CTDPA), Utah (UCPA), and subsequent state frameworks |
| GDPR Principles | International | Data export, right to erasure, consent management, and data processing records — aligned with GDPR principles for multinational clients |
Architecture aligned with AICPA Trust Services Criteria across Security, Availability, Confidentiality, Processing Integrity, and Privacy. Formal audit in progress.
Information security management controls aligned with ISO 27001 Annex A — including A.10 (Cryptography), A.9 (Access Control), and A.12 (Operations Security).
Hardware Security Module key management aligned with FIPS 140-3 Level 2 for cryptographic module validation. HSM-backed key operations for all tenant encryption keys.
Full compliance with Canada's Personal Information Protection and Electronic Documents Act, including consent, data minimization, breach notification, and right of access.
Platform accessibility aligned with Web Content Accessibility Guidelines Level AA across all public-facing and authenticated interfaces.
Zero Trust Architecture implementation aligned with NIST SP 800-207 principles: verify explicitly, use least-privilege access, and assume breach at every layer.
Machine learning-powered User and Entity Behavior Analytics (UEBA) continuously profile normal activity and surface anomalies before they become incidents.
The TrueNorth WCI™ whistleblower system is designed so that the platform itself cannot identify the submitter. Reports are submitted through a structurally anonymous channel that collects no personally identifiable information, no IP addresses, no device fingerprints, and no session tokens that could be used to trace a submission to an individual. This architecture is designed to withstand legal discovery requests — the platform cannot produce information it does not possess.
Our team can provide detailed security documentation, SOC 2 alignment documentation, data processing agreements, and responses to vendor security questionnaires.
© 2026 TrueNorth Workforce Compliance Intelligence Inc. All rights reserved. TrueNorth WCI™ is a registered trademark. Patent pending. Security certifications and compliance alignments described on this page represent the architectural design targets and operational practices of the platform. Specific certification status and audit reports are available upon request under NDA. This page does not constitute a contractual commitment. Actual security controls are governed by the applicable Master Services Agreement.