Forcepoint’s Compliance Hub
Privacy and Data Security at Forcepoint
Our Continuing Promise
From behavior-centric data security policies to AI-powered data classification, securing information is at the core of what we do. Discover more about our best-in-class privacy and compliance measures, and how we’re always working to improve.
Forcepoint Data Protection & Privacy Program
Many organizations have legitimate questions about the privacy of their data and the ever-evolving data protection landscape. To this end, Forcepoint demonstrates its commitment to privacy and data security by outlining the measures we have taken and the way we conduct business within Forcepoint.
Privacy Policy: The Forcepoint Privacy Policy explains how Forcepoint collects, uses, discloses and transfers the personal information you provide to us or we collect when you use our website, do business with Forcepoint, or use Forcepoint’s security products and services
Cookie Policy: The Forcepoint Cookie Policy explains how Forcepoint uses cookies and similar technologies to recognize you when you visit Forcepoint's website(s).
Data Processing and Protection Measures: The Forcepoint Data Processing and Protection Measures set forth the commitments made to customers regarding the processing, transfer, and protection of the customer’s data when using Forcepoint products and services.
Data Protection Requirements: The Forcepoint Data Protection Requirements set forth the commitments Forcepoint requires from its vendors, suppliers, and partners when processing, transferring, and protecting data provided by Forcepoint.
Forcepoint Sub-Processors List: The Forcepoint Sub-Processor List sets forth the third-party suppliers engaged by Forcepoint that may process, transfer, or store a customer’s personal data on behalf of Forcepoint when helping provide the Forcepoint products and services.
How Forcepoint’s Products Protect Your Privacy
Forcepoint adheres to an approach of “privacy by design” in which our products incorporate best practices for managing personal and sensitive data right from the start. To learn more about how each product keeps information safe, click on the Management of Personal Data documents below.
- Forcepoint Data Security Posture Management (DSPM)
- Data Risk Assessment (DRA) Trial
- Data Security Cloud | SSE
- Data Loss Prevention (DLP)
- Data Protection Services (DPS)
- Email Security - Cloud
- Secure SD-WAN
- Remote Browser Isolation (RBI)
- Web Security - Cloud
- Dynamic User Protection (DUP)
- Advanced Malware Detection and Protection (AMDP)
Forcepoint Organizational Compliance & Security Operations
Forcepoint’s Compliance and Security program is designed to provide customers with transparency into the controls governing our products and operations, and the security measures we take to protect our systems and customer information.
We comply with numerous international and regional compliance programs, laws, and regulations.

Forcepoint Trust Center
The Forcepoint Trust Center provides a centralized location to ask compliance and security questions and request access to our ISO Statement of Applicability and SOC 2 Type II certifications and assessments. Visit https://trust.forcepoint.com to get started!
Public documents
- Data Sovereignty, Residency and Localization in the Cloud - Cut through the various misconceptions around global data protection laws and requirements for the use of cloud services.
- Secure Testing Methodology whitepaper - The Forcepoint Secure Testing Methodology is a crucial part of an end-to-end process that works in lockstep with Forcepoint’s Secure Software Development Lifecycle (SSDLC) - also known as our Secure Development Process - to ensure security-by-design. Forcepoint’s SSDLC includes elements of secure design, secure release and security education.
- Forcepoint Product Security Vulnerability Notice and Mitigation Policy - Forcepoint Product Security Vulnerability Notice and Mitigation Policy describes the steps Forcepoint follows when responding to and mitigating newly discovered security vulnerabilities or information of active exploitation of a security flaw or weakness.
- Modern Slavery Act Statement - Forcepoint is committed to preventing modern slavery and human trafficking in its business operations and supply chains.
- Forcepoint Ireland Gender Pay Gap Report
- Customer Care
- Forcepoint EU DORA Compliance document
- Covered Entity Compliance with HIPAA and Forcepoint Products