Org Logo

Founded in 2024

Controls

Continuously monitored

Product security (1)

Situational Awareness For Incidents

Data security (5)

Identity Validation

Termination of Employment

Encrypting Data At Rest

Network security (3)

External System Connections

Transmission Confidentiality

Data used in Testing

App security (3)

Conspicuous Link To Privacy Notice

Secure system modification

Approval of Changes

Endpoint security (2)

Malicious Code Protection (Anti-Malware)

Endpoint Security Validation

Corporate security (31)

Code of Business Conduct

Organizational Structure

Roles & Responsibilities

Resources (40)

Acceptable Usage Policy

Data Protection Policy

HR Security Procedure