ControlsUpdated 7 minutes agoView all controls
Infrastructure security
- Unique production database authentication e...
- Encryption key access restricted
- Unique account authentication enforced
Organizational security
- Asset disposal procedures utilized
- Portable media encrypted
- Employee background checks performed
Product security
- Data encryption utilized
- Control self-assessments conducted
- Penetration testing performed
Internal security procedures
- Continuity and Disaster Recovery plans estab...
- Cybersecurity insurance maintained
- Configuration management system established
Data and privacy
- Data retention procedures established
- Customer data deleted upon leaving
- Data classification policy established
AI Security
- Data retention procedures established
- Encryption key access restricted
- Unique account authentication enforced
Data collected
- Customer personally identifiable information
- Employee personally identifiable information
- Credit card information
- Personal health information
