Stay compliant with Codeproof Cyber Device Manager®

Centralize device policy, encryption and auditing across iOS, Android, Windows and macOS to reduce risk and support regulatory requirements.

Codeproof helps organizations in regulated industries protect data on mobile devices, laptops and desktops. Use policy enforcement, containerization, app controls and selective wipe to support your compliance program.

Below are quick summaries and checklists for common laws and frameworks. Compliance depends on the totality of your controls and processes. Codeproof provides technical capabilities that help you implement and monitor many endpoint requirements.

HIPAA

HIPAA

Safeguard ePHI with encryption, access control and selective wipe.

Download checklist (PDF)

GDPR

GDPR

Support data minimization and privacy by design with BYOD containers.

Download checklist (PDF)

ELD

ELD mandate

Lock endpoints to driver apps and manage updates for fleets.

Download checklist (PDF)

CJIS

CJIS Security Policy

Encryption, jailbreak or root detection, allow lists and audit evidence.

Download checklist (PDF)

SOC 2 and SOC 3

SOC 2 and SOC 3

Secure baselines, update posture, BYOD separation and audit trails.

Download checklist (PDF)

ISO 27001

ISO/IEC 27001

Asset inventory, encryption, certificates and incident response evidence.

Download checklist (PDF)

CCPA and CPRA

CCPA and CPRA

BYOD separation, data controls, selective wipe and accountability.

Download checklist (PDF)

NIST SP 800-53

NIST SP 800-53

Access control, configuration management and secure communications.

Download checklist (PDF)

Education FERPA and COPPA

Education: FERPA and COPPA

Student privacy, kiosk testing modes, web filtering and fast reprovisioning.

Download checklist (PDF)

Audit evidence you can export

  • Device and user inventory with ownership and groups
  • Policy baselines and configuration history
  • App catalogs, versions and deployment targets
  • Compliance and patch posture by device group
  • Activity and admin audit logs

Compliance FAQs

Does using Codeproof make us compliant?
Codeproof provides technical controls for devices and apps. Compliance requires your policies, training and procedures in addition to technical measures.
Can Codeproof block unpatched or noncompliant devices?
Yes. Use compliance checks and allow only devices that meet policy to access sensitive apps and networks. Noncompliant devices can be quarantined or remediated.
How does BYOD fit into compliance?
Use Android Work Profile and Apple User Enrollment to manage only the work container. Personal data remains private and a selective wipe removes only work content.
Do you support kiosk and POS for regulated workflows?
Yes. Lock corporate owned devices to single app or multi-app mode and prevent unauthorized software or settings changes.

Maximize employee productivity through Codeproof