Enterprise SaaS Authentication System for SOC 2 Compliance
Enterprise SaaS authentication systems require specialized security controls and compliance features to meet enterprise customer security requirements and close deals with Fortune 500 companies. ProofGrid provides enterprise SaaS authentication infrastructure with audit trails and security controls that can support your SOC 2 compliance efforts for B2B platforms, multi-tenant applications, and enterprise software systems.


Enterprise Security Requirements
Critical SaaS Authentication Policies
Unique user identification for every individual accessing multi-tenant SaaS applications
Automatic logoff procedures to prevent unauthorized access to unattended enterprise workstations
Role-based access controls aligned with customer organization hierarchies and permission structures
Multi-factor authentication for privileged users accessing administrative functions and customer data
Emergency access procedures for critical system operations with enhanced audit logging
Integration with enterprise security monitoring and incident response systems for comprehensive protection
SaaS Security Benefits
SaaS Compliance Advantages
Multi-layered authentication protection for customer business accounts and sensitive enterprise data
Real-time fraud detection through authentication pattern analysis and anomaly monitoring
Secure session management preventing unauthorized access to SaaS systems and customer information
Advanced audit capabilities providing detailed business transaction and access logging
Risk-based authentication adapting security levels based on user roles and access patterns
Integration with existing enterprise security infrastructure and business continuity systems
Multi-tenant security with customer data isolation and cross-tenant access prevention
API security for business system integrations and third-party enterprise service connections
Automated security incident response for suspicious authentication activities and potential breaches
Compliance-ready security controls supporting enterprise customer security assessments and audit requirements
Protection against unauthorized access to customer data and sensitive business information
Reduced risk of security violations through comprehensive access controls and audit trail generation
Enhanced customer trust through visible security measures and compliance with enterprise security standards
Improved operational efficiency through secure single sign-on across SaaS application suites
Integration with existing enterprise infrastructure and customer identity management systems
Administrative safeguards that can support SOC 2 Security Rule compliance efforts
Documentation features that may assist with enterprise security assessment requirements
Authentication and access management tools that can support enterprise compliance initiatives
Enhanced security controls and breach prevention features that may help with customer security requirements
Audit trail features that can help with SOC 2 audit preparation
Enterprise SaaS-Ready Authentication Features
Audit Logging Capabilities
Comprehensive Audit Trails: ProofGrid provides detailed audit logging that can support your SOC 2 compliance documentation needs.
Authentication Logging Features:
User authentication and access event logging with timestamps
Failed authentication attempt tracking and analysis
Administrative action logging for system configuration changes
Exportable audit reports in PDF and CSV formats
Search and filtering capabilities for audit review
Note: These are logging tools to support your compliance efforts. You remain responsible for SOC 2 compliance and should consult with compliance professionals.
Enterprise User Role Templates
Flexible Role Management: ProofGrid provides configurable user roles that you can customize to align with your customer organization structures and access requirements.
Role Configuration Examples:
Customer admin access with comprehensive tenant permissions
End user access with application-specific permissions
Support team access with limited troubleshooting permissions
Customer portal access with self-service permissions
Emergency access with time-limited elevated permissions
Note: Role configurations must be customized by your organization to meet your specific customer requirements and compliance needs.
Minimum Necessary Access:
Role-based permission sets designed around customer organization functions and responsibilities
Role-based access controls that can support least privilege access principles for your SOC 2 compliance efforts
Quick role assignment for new customer users with appropriate permission levels
Flexible role customization for enterprise customer environments and unique organizational needs
Enterprise Session Policies
SaaS Environment Session Management: ProofGrid includes pre-configured session policies optimized for enterprise SaaS environments and business workflow requirements.
Enterprise-Specific Timeouts:
Business application policies with extended timeouts for document editing and collaboration activities
Administrative workstation policies with standard timeout periods for non-administrative users
Emergency override capabilities for critical business operations with supervisor approval
Mobile device policies for remote worker smartphones and tablets
Customer portal policies with business-friendly timeout periods and productivity optimization
Workflow Integration:
Session policies designed around business workflows and customer productivity activities
Warning notifications optimized for enterprise environments and user experience
Quick re-authentication procedures for returning business users and administrators
Emergency session extension capabilities for urgent business operations
Emergency Access Capabilities
Emergency Access Features:
Emergency access request with reason documentation and supervisor notification
Supervisor approval workflow with email notification and approval tracking
Time-limited elevated permissions with automatic session expiration
Enhanced audit logging for all emergency access events including requestor, approver, reason, and activities
Automatic notification when emergency access session expires
SOC 2 Compliance:
Emergency access procedures and documentation that can support SOC 2 administrative safeguard requirements
Supervisor approval workflow ensuring appropriate authorization for elevated access
Comprehensive audit trail for emergency access events and activities
Time-limited access preventing indefinite elevated permissions
Enterprise Compliance Dashboard
Authentication Monitoring: ProofGrid provides authentication analytics and monitoring that can support your compliance oversight activities.
Compliance Status Visualization:
Real-time authentication monitoring with security status indicators
Failed authentication attempt analysis with security trend identification and risk assessment
User access pattern analytics for unusual activity detection and security monitoring
Session timeout monitoring with policy adherence tracking and reporting
Emergency access usage tracking with approval workflow status and audit documentation
SaaS Analytics:
Customer authentication patterns and business workflow analysis for optimization opportunities
User engagement analytics and productivity metrics for enterprise customer experience
Authentication trend analysis that can support your ongoing SOC 2 compliance monitoring
Security incident tracking and resolution metrics for enterprise risk management
Performance benchmarking against SaaS industry standards and best practices
Enterprise SaaS Use Cases and ROI
Large B2B Platform Authentication
Multi-Tenant Authentication Challenge: Enterprise SaaS platforms need unified authentication across multiple customer organizations while maintaining data isolation and security compliance.
Expected Benefits:
Potential reduction in customer support tickets through single sign-on across business applications
Authentication audit trails that can support your SOC 2 audit preparation
Improved customer onboarding through streamlined authentication workflows
Enhanced security monitoring with comprehensive audit trails
Potential revenue increase through faster enterprise deal closure
Authentication Advantages:
Detailed audit trails that may assist with your enterprise customer security assessment requirements
Comprehensive authentication logs for your SOC 2 audit preparation
Multi-tenant authentication infrastructure with customer data isolation
Authentication system that can support your customer security agreement requirements
Documented authentication controls and audit evidence for your compliance efforts
Implementation Support:
Multi-tenant authentication architecture design and planning
Authentication infrastructure designed for integration with CRM systems and business applications
Customer workflow analysis and authentication system optimization
Team training and change management for authentication system adoption
Ongoing technical support and system maintenance for SaaS environments
SaaS Startup Authentication
Authentication Needs for Growing SaaS Companies: SaaS startups need secure authentication infrastructure to meet enterprise customer security requirements and accelerate sales cycles.
Potential Outcomes:
Authentication infrastructure that can support your SOC 2 compliance efforts
Enhanced customer portal login experience for better user engagement
API integration capabilities with CRM and business management systems
Detailed authentication logs for your audit documentation needs
Secure and convenient portal access for business customers
Value Proposition:
Quick implementation of authentication infrastructure
Reduced password-related support issues for small customer success teams
Improved portal security and user experience
Authentication audit trails to support your compliance documentation
Professional authentication system for enterprise customer confidence
Implementation Support:
Authentication system integration with your SaaS platform and business systems
CRM integration assistance and technical documentation
Configuration guidance for enterprise SaaS-specific authentication requirements
Training and onboarding support for your team
Ongoing technical support for authentication infrastructure maintenance
Enterprise Marketplace Authentication
Authentication Infrastructure for B2B Marketplaces: Enterprise marketplace platforms need secure authentication for vendors, buyers, and administrators accessing multi-sided business platforms.
Authentication Features:
Secure user authentication for marketplace platform access
Multi-factor authentication for enhanced security
Session management for vendor and buyer portals
Audit trails of authentication events and user access
Role-based access controls for different user types
Technical Benefits:
Streamlined login experience for vendors and buyers
Detailed authentication logs for your security monitoring
Configurable session timeouts for different user roles
Integration with your existing marketplace platform infrastructure
API-based authentication that works with your current systems
Implementation Support:
Authentication system integration with your marketplace platform
Technical documentation and developer resources
Session management configuration for your specific requirements
Audit logging setup to support your compliance documentation efforts
Risk Mitigation Strategies:
Multi-factor authentication implementation for high-risk access scenarios and privileged users
Real-time monitoring and alerting for suspicious authentication activities and access patterns
Automated incident response procedures for authentication failures and security events
Regular penetration testing and vulnerability assessment for authentication infrastructure
Team training and awareness programs for secure authentication practices and social engineering prevention
Compliance Risk Assessment:
Authentication system vulnerability analysis and security assessment
Third-party vendor risk assessment for SaaS authentication service providers
Customer security agreement compliance monitoring and vendor management procedures
Incident response planning and breach notification procedures for authentication-related events
Insurance and liability assessment for authentication-related security violations and penalties
Enterprise Security Incident Management
Automated threat detection and response for SaaS authentication systems and customer data protection
Real-time security monitoring with immediate alerting for suspicious enterprise system access attempts
Incident escalation procedures for authentication-related security events and potential data breaches
Customer notification procedures for authentication-related security incidents affecting business operations
Regulatory reporting workflows for SaaS authentication breaches and compliance violation incidents
SaaS Data Protection Strategies
Customer business data encryption during authentication processes and secure transmission protocols
Access control enforcement preventing unauthorized SaaS system access and data exposure
Multi-factor authentication enforcement for high-risk business transactions and privileged system access
Geographic access controls for SaaS systems based on customer location and business requirements
Regular security assessments and penetration testing for SaaS authentication infrastructure and customer protection
SOC 2 Risk Management
Breach Prevention and Response
Audit Preparation and Documentation
Audit Trail Requirements:
User authentication and access event logging with timestamps and system context identification
Customer business data access documentation with organization identification and transaction references
Administrative action logging for authentication system configuration and user management activities
Security incident documentation and response procedures for authentication-related threats
Authentication reporting and metrics collection that can support your SOC 2 audit preparation efforts
Documentation Management:
Authentication policy and procedure documentation with regular review and update procedures
User training and awareness program documentation with completion tracking and certification
Risk assessment and mitigation documentation with ongoing monitoring and improvement procedures
Vendor management and business associate agreement documentation with compliance monitoring
Incident response and breach notification documentation with regulatory reporting procedures
Ongoing Compliance Monitoring
Compliance Monitoring Procedures:
Regular access reviews and user permission audits with documentation and approval workflows
Security policy updates and implementation procedures for changing SOC 2 requirements
Vendor compliance monitoring and business associate agreement management
Team training and awareness program updates with regulatory change communication
Performance metrics and compliance reporting with executive oversight and governance procedures
Regulatory Change Management:
SOC 2 regulation updates and implementation impact assessment for authentication systems
Enterprise security standard compliance monitoring and multi-jurisdictional requirement management
Industry standard updates and best practice implementation for SaaS authentication security
Technology advancement evaluation and security enhancement opportunity identification
Compliance framework integration with other enterprise regulations and accreditation requirements
Authentication-Related Breach Risks: SaaS organizations face significant financial and reputational risks from authentication-related security breaches and compliance violations.
SOC 2 Audit Readiness: SaaS organizations must maintain comprehensive documentation and evidence for SOC 2 compliance audits and customer security assessments.
Continuous SOC 2 Compliance: Enterprise SaaS authentication systems require ongoing monitoring and assessment to maintain SOC 2 compliance and adapt to changing customer security requirements.
Administrative Safeguards Implementation:
Assigned security responsibility with designated security officers overseeing authentication systems
Workforce training and access management for SaaS authentication security and compliance
Information access management with role-based permissions and least privilege access principles
Security awareness and training programs for SaaS team members and contractors
Security incident procedures for authentication-related breaches and compliance violations
Physical and Technical Safeguards:
Workstation use controls through authentication-based access management and monitoring
Device and media controls for SaaS authentication systems and infrastructure
Access control implementation through unique user identification and authentication procedures
Audit controls and monitoring for SaaS authentication system effectiveness and compliance
Integrity controls for customer business data protection through authentication-based access restrictions
Enterprise SaaS Authentication Compliance Considerations
SOC 2 Security Rule Requirements
Enterprise Security Standards Compliance
Enhanced Enterprise Enforcement:
Breach notification procedures for SaaS authentication security incidents and violations
Vendor liability for SaaS authentication service providers and technology partners
Enhanced penalties for SaaS authentication violations and non-compliance incidents
Audit controls and monitoring for SaaS authentication system effectiveness and improvement
Risk assessment and mitigation for SaaS authentication vulnerabilities and threats
Enterprise Data Protection Enhancement:
Encryption requirements for customer business data transmission through authentication systems and communications
Access controls and user authentication for enhanced enterprise data protection and privacy
Audit trail generation for enterprise compliance reporting and security assessment preparation
Risk management procedures for SaaS authentication system security and compliance
Compliance monitoring and assessment for ongoing enterprise security requirement satisfaction
Enterprise Information Management Standards
SaaS Security Requirements:
Information management standards for SaaS authentication and access control systems
Customer protection requirements for secure business data access and protection procedures
Performance improvement standards for SaaS authentication system effectiveness and optimization
Leadership standards for enterprise information security governance and oversight responsibilities
Human resources standards for SaaS team authentication training and competency assessment
Enterprise Compliance Documentation:
SaaS authentication policy and procedure documentation for enterprise customer security assessment preparation
Team training and competency assessment documentation for SaaS authentication security
Performance monitoring and improvement activity documentation for SaaS authentication systems
Leadership oversight and governance documentation for enterprise information security management
Customer protection and quality assurance integration with SaaS authentication control procedures
Vendor Evaluation Framework:
Authentication controls that can support SOC 2 administrative safeguard requirements
Business associate agreement willingness and comprehensive liability coverage for enterprise compliance
Audit trail capabilities meeting enterprise requirements for customer business data access documentation and reporting
Integration capabilities with existing enterprise infrastructure and business management systems
Incident response procedures and breach notification compliance with enterprise security requirements
Technical Capability Assessment:
Integration capabilities for major business systems including CRM platforms, ERP systems, and collaboration tools through standard authentication protocols
Business workflow optimization features for team efficiency and customer service quality
Customer portal authentication capabilities with enterprise-grade user experience and security controls
Mobile device support for remote worker mobility and distributed team access requirements
Scalability and performance capabilities for SaaS organization growth and customer volume increases
Enterprise Vendor Selection Guide
Authentication System Evaluation Criteria
Implementation Timeline and Resources
Implementation Planning:
Initial assessment and planning phase requiring 2-4 weeks for comprehensive requirement analysis
System configuration and testing phase requiring 4-6 weeks for SaaS environment integration
Team training and change management phase requiring 2-3 weeks for adoption and competency development
Go-live and optimization phase requiring 1-2 weeks for production deployment and performance tuning
Ongoing support and maintenance requiring dedicated resources for compliance monitoring and system management
Resource Requirements:
SaaS IT leadership involvement for strategic decision-making and vendor management oversight
Business stakeholder participation for workflow optimization and user experience requirement definition
Compliance and legal team involvement for SOC 2 requirement verification and vendor agreement negotiation
Training and change management resources for team adoption and competency development
Ongoing technical support resources for system maintenance and compliance monitoring
SOC 2 Compliance Assessment: SaaS organizations should evaluate authentication vendors based on security capabilities that can support SOC 2 compliance efforts.
Enterprise SaaS Authentication Deployment: SaaS organizations require realistic timeline expectations and resource allocation for authentication system implementation to support their SOC 2 compliance goals.
Vendor Support and Service Evaluation
Enterprise Implementation Expertise: Authentication vendors should demonstrate specialized SaaS industry knowledge and implementation experience to support your SOC 2 compliance efforts.
Service Capability Assessment:
SaaS industry experience with similar enterprise software organizations and regulatory environments
SOC 2 compliance consulting capabilities and regulatory expertise for ongoing requirement satisfaction
Business workflow analysis and optimization services for team efficiency improvement
Training and change management services for team adoption and competency development
Ongoing support and maintenance services with SaaS-specific knowledge and regulatory awareness
Partnership Evaluation:
Long-term vendor stability and SaaS market commitment for sustained partnership success
Innovation and development roadmap alignment with enterprise software industry trends and regulatory changes
Reference customer availability for SaaS implementation experience and satisfaction verification
Professional service capabilities for complex enterprise integration and optimization requirements
Escalation and support procedures for critical business issues and emergency response scenarios
Compliance Verification Checklist:
✓ Unique user identification implemented for every individual accessing SaaS systems
✓ Automatic logoff procedures configured and tested for workstation security compliance
✓ Role-based access controls aligned with business functions and least privilege principles
✓ Emergency access procedures documented and tested for critical business operations
✓ User training and awareness programs implemented for secure authentication practices
Documentation Requirements:
✓ Written authentication policies and procedures with regular review and update schedules
✓ User access management procedures with provisioning and deprovisioning documentation
✓ Security incident response procedures with authentication-related event handling protocols
✓ Risk assessment documentation with authentication vulnerability identification and mitigation
✓ Business associate agreements with authentication vendors and service providers
Enterprise SaaS Compliance Checklist
SOC 2 Administrative Safeguards Verification
Audit Trail and Monitoring Requirements
Audit Trail Verification:
✓ User identification and authentication event logging with timestamps and system context
✓ Customer business data access documentation with organization identification and transaction references
✓ Failed authentication attempt logging with security monitoring and alerting capabilities
✓ Administrative action logging for authentication system configuration and user management
✓ Audit log protection and integrity controls preventing unauthorized modification or deletion
Monitoring and Reporting:
✓ Real-time security monitoring with authentication anomaly detection and alerting capabilities
✓ Regular audit log review procedures with security event analysis and investigation protocols
✓ Compliance reporting capabilities with automated audit trail collection and documentation generation
✓ Performance monitoring with authentication system effectiveness measurement and optimization
✓ Incident response integration with security event escalation and notification procedures
Required Authentication Controls: SaaS organizations should verify that authentication systems can support specific SOC 2 administrative safeguard requirements for customer business data protection.
Authentication Audit Trail Generation: Enterprise SaaS authentication systems should generate comprehensive audit trails that can support SOC 2 documentation requirements for customer business data access logging.
Integration and Workflow Verification
Enterprise System Compatibility: Authentication systems must integrate seamlessly with SaaS infrastructure while maintaining business workflow efficiency and user experience quality.
Integration Compliance Checklist:
✓ Business system integration with single sign-on capabilities and workflow optimization
✓ Customer portal authentication with enterprise-grade user experience and security controls
✓ Mobile device support with remote worker mobility and distributed team access capabilities
✓ Business application federation with unified authentication experience and session management
✓ CRM and ERP integration with secure authentication for business management systems
Workflow Optimization Verification:
✓ Business productivity improvement through streamlined authentication and reduced friction
✓ Emergency access procedures tested and validated for critical business operations
✓ Team satisfaction assessment with user experience feedback and optimization recommendations
✓ Customer engagement improvement through secure and convenient portal access procedures
✓ Training effectiveness measurement with competency assessment and ongoing education programs
Important: This checklist provides guidance for authentication system evaluation. You remain responsible for SOC 2 compliance and should work with qualified compliance professionals to ensure all requirements are met.
Professional Enterprise SaaS Implementation Services
The Algorithm Enterprise SaaS Authentication Expertise
SaaS Implementation Experience
Enterprise SaaS platform authentication integration across multiple customer organizations and business departments
API-based authentication that can integrate with business management systems including Salesforce, HubSpot, Microsoft 365, and other major enterprise platforms
SaaS authentication consulting and technical analysis for authentication systems and security policies
Business workflow optimization and user experience design for SaaS teams and customer organizations
Multi-tenant SaaS authentication for B2B platforms, marketplace applications, and enterprise software organizations
Regulatory Compliance Expertise
Enterprise SaaS Authentication Implementation Services
Authentication controls that can support SOC 2 administrative safeguard requirements
Enhanced security controls and documentation that may assist with enterprise security compliance efforts
Authentication documentation that may assist with customer security assessment requirements
Authentication infrastructure that can support enterprise compliance initiatives across jurisdictions
Audit trail documentation that can assist with SOC 2 audit preparation
Comprehensive Implementation Support:
Enterprise SaaS authentication architecture design and SOC 2 compliance assessment with regulatory expertise
Business system integration and SaaS application compatibility testing and optimization for customer workflows
Business workflow analysis and authentication system optimization for customer service efficiency and team satisfaction
SaaS team training and change management for authentication system adoption and competency development
SOC 2 audit preparation and compliance documentation for customer security assessments and enterprise evaluations
Ongoing SaaS Support:
SaaS authentication monitoring and incident response support for business environments and customer service
Authentication monitoring and audit support for SaaS organizations and their documentation requirements
Business system integration support and optimization for workflow enhancement and team efficiency
Enterprise security incident response and forensic analysis for customer data protection and compliance
Scalability planning and capacity management for growing SaaS authentication needs and customer volumes
Enterprise SaaS Industry Specialization: The Algorithm provides comprehensive SaaS authentication implementation services with deep understanding of SOC 2 requirements, business workflows, and enterprise software industry regulatory challenges.
Enterprise SaaS Strategic Consulting
SaaS Technology Leadership
Enterprise SaaS Market Expertise
SaaS authentication vendor selection and evaluation assistance for business system compatibility and compliance
SOC 2 risk assessment and threat modeling for SaaS authentication architecture and security
Enterprise SaaS authentication strategy development and technical implementation planning for your regulatory requirements
Business workflow optimization and user experience consulting for team efficiency and customer satisfaction
SaaS business continuity planning for critical authentication infrastructure protection and disaster recovery
Enterprise software industry trend analysis and authentication technology roadmap development for strategic planning
Regulatory change management and compliance strategy development for evolving SOC 2 requirements
SaaS merger and acquisition authentication integration support for organizational consolidation
Digital business transformation and SaaS authentication strategy development for enterprise customer acquisition
Enterprise software innovation consulting for emerging authentication technologies and customer engagement platforms
Getting Started with Enterprise SaaS Authentication
Assessment Components:
Current SaaS authentication system SOC 2 compliance gap analysis and vulnerability identification
Business system integration complexity evaluation and compatibility assessment with existing systems
Business workflow impact analysis and user experience optimization requirements for SaaS teams
Enterprise SaaS authentication requirements analysis for customer security assessments and compliance documentation needs
Budget and timeline planning for comprehensive SaaS authentication implementation and ongoing maintenance
Stakeholder Engagement:
SaaS executive leadership involvement for strategic decision-making and resource allocation approval
Business stakeholder participation for workflow optimization and user experience requirement definition
Compliance and legal team involvement for SOC 2 requirement verification and vendor agreement negotiation
IT leadership coordination for technical integration and infrastructure requirement assessment
Training and change management team preparation for team adoption and competency development
Enterprise SaaS Implementation Phases
Phase 1: SaaS Assessment and Planning (2-3 weeks)
SOC 2 compliance gap analysis and SaaS authentication requirement assessment with regulatory expertise
Business workflow analysis and user experience design for team efficiency and customer service optimization
Business system integration planning and SaaS application compatibility evaluation with vendor coordination
Enterprise security architecture design and threat modeling for customer data protection and compliance
Phase 2: SaaS System Configuration (3-4 weeks)
SaaS authentication system configuration and security policy implementation
Business system integration implementation and SaaS application single sign-on configuration with workflow testing
Business workflow testing and user experience optimization for SaaS teams and customer organizations
Authentication audit trail configuration and reporting system integration with documentation generation
Phase 3: SaaS Integration and Testing (2-3 weeks)
Business workflow integration testing and SaaS team training program implementation with competency assessment
Customer portal authentication testing and enterprise user experience optimization with security control integration
Emergency access procedure testing and critical business operation workflow validation with break-glass authentication
Security testing and vulnerability assessment for authentication infrastructure
Phase 4: SaaS Production Deployment (1-2 weeks)
Production SaaS authentication deployment and business system integration with monitoring setup
SaaS team training and authentication system adoption procedures with ongoing competency assessment
Authentication monitoring and audit trail setup to support regulatory documentation requirements
Ongoing support and maintenance procedures for SaaS authentication system optimization and compliance
Related Resources:
OAuth 2.0 & SSO Integration
Enterprise Multi-Factor Authentication
API Security and Access Control
Professional Implementation Services
SOC 2 Compliance Assessment: SaaS organizations should conduct comprehensive assessment of current authentication systems and SOC 2 compliance status before implementing new enterprise SaaS authentication infrastructure.
Enterprise SaaS Implementation Planning
Compliance
Authentication platform with audit logging capabilities. A product by The Algorithm.
Security
Integration
© 2025 The Algorithm. All rights reserved.
Disclaimer: ProofGrid provides authentication tools that can support HIPAA/ SOC 2 compliance efforts. This information is for educational purposes only and does not constitute legal or compliance advice. Organizations remain responsible for their own HIPAA/ SOC 2 compliance and should consult with qualified compliance professionals.