Each certification attests to the strength of our governance, internal controls, and risk management. Audits are conducted annually by independent firms according to international standards.
Security, availability, integrity, confidentiality, and privacy audit.

This certification verifies, over several months, that all of a company's internal controls actually work (not just on paper).
The audit covers 5 aspects: security, integrity, availability, confidentiality, and privacy.
SOC 2 Type II demonstrates that TnS has its security and confidentiality practices audited in the same way as a Canadian bank.
Information Security Management System (ISMS).

ISO 27001 is the main international standard for information security management.
It covers everything: risk analysis, access control, encryption, business continuity plan.

ISO 27001 proves that security at TnS is not improvised: it is planned, measured, and audited every year.
Privacy extension compliant with international principles and Law 25.

ISO 27701 complements ISO 27001, but focuses on privacy management (PIMS).
It governs consent, access, deletion, and minimization of personal information.

ISO 27701 guarantees that TnS respects the privacy of each user according to the strictest rules of Law 25 and Canadian regulators.
| COMPLIANCE CRITERIA | DISPARATE TOOLS SMS · Messenger · WhatsApp · Email · Dropbox... | TCHAT N SIGN All your channels unified |
|---|---|---|
| Client channels | SMS · Messenger · WhatsApp used without control | SMS · Messenger · WhatsApp (coming soon) centralized and archived |
| Internal communication | Personal email, Teams, texts between colleagues | Secure internal chat traceable team conversations |
| Document sharing | Email, Dropbox, Google Drive (foreign servers) | Secure HTTPS links with 2FA authentication |
| Where is data stored? | Foreign servers (Meta, Google, Microsoft, etc.) | Canada only (Azure Canada East & Central) |
| Communication security | Variable depending on tool, unverifiable | Enterprise-grade encryption |
| Who can access? | Third-party providers and their partners | Restricted access, logged and auditable |
| Legal archiving | None — data scattered and out of control | Automatic and timestamped archiving |
| Proof in case of dispute | Hard to reconstruct | Complete and legally enforceable history |
| Law 25 compliance | Non-compliant | Compliant |
| Professional secrecy | Risk of disclosure | Private channels per client |
| CIRO supervision | Impossible to audit | Verifiable records |
| Regulatory risk | High | Managed |
SMS, Messenger, WhatsApp, team conversations, document sharing — everything goes through a single platform hosted in Canada.
Your clients keep their habits, your team collaborates efficiently, and every exchange is automatically archived for your compliance.
Digital exchanges often contain sensitive data: social insurance numbers, statements, confidential documents. Tchat N Sign integrates artificial intelligence that acts as an automatic safeguard, identifying and neutralizing risks before they compromise your compliance.
Our AI doesn't replace your teams — it protects them, by systematically applying best practices required by Law 25 and Canadian regulatory bodies.
Personal information in messages and attachments.
Sensitive content to ensure confidential data security.
Instant notifications in case of leak or breach risk.
User access to strengthen information protection.
Compliance should not depend on human vigilance. With Tchat N Sign, every exchange is monitored, filtered, and archived according to the highest Canadian security standards — without burdening your operations.
The information presented on this page aims to facilitate understanding of legal and ethical requirements applicable to financial services professionals. It does not constitute legal advice nor an official interpretation of the laws or regulations mentioned.
Tchat N Sign implements technological measures designed to help firms and professionals meet their security and confidentiality obligations. However, regulatory compliance remains the responsibility of each firm or professional who must verify that their internal policies and practices meet the requirements of Law 25, the CSF Code of Ethics and CIRO rules, as well as applicable federal and provincial laws.
Tchat N Sign acts as a technology provider and not as a legal advisor. The examples and legal references provided illustrate the links between our features and regulatory frameworks. Each organization must perform its own verifications and obtain independent legal advice as needed.

In summary: Tchat N Sign is a compliance facilitator. Each firm remains responsible for its regulatory compliance.
All data is hosted on Azure Canada East & Central, not subject to Cloud Act.
Encryption in transit (TLS 1.3) and at rest (AES-256) for all data.
Automatic detection and prevention of sensitive data leaks.
Automatic timestamped archiving compliant with regulatory requirements.
Would you like to review our SOC 2 reports, ISO certificates or detailed security policy? Contact our security team to obtain these documents under a confidentiality agreement.
Request DocumentsAll data is hosted on Microsoft Azure Canada East & Central (Toronto and Quebec). With the exception of VoIP data that may transit through US servers for technical reasons, all data remains in Canada.
You can exercise your rights of access, rectification, erasure or portability by sending an email to [email protected]. We will respond within a reasonable time after verifying your identity.
Yes, our AI analyzes communication content to detect and prevent sensitive data leaks. No automated decision with legal effects is made without human intervention. You have the right to request human review of any analysis.
Retention periods vary by data type: user account (duration + 7 years), signed documents (7 days then archived to SharePoint/CRM), VoIP recordings (5-7 years per regulations), logs (12 months). See our privacy policy for the complete schedule.
Yes, the SOC 2 Type II report is available under a non-disclosure agreement (NDA). Contact [email protected] to request it.
Our security team is available to answer your questions about our data protection practices.
[email protected]