People are at the heart of our security program. Ambassify invests in hiring, training, and supporting our team so that every person understands their role in protecting your data from day one through their last.

Background Screening

We verify the background and qualifications of all personnel before granting access to sensitive systems.

  • Pre-employment Checks - Background checks are conducted during the hiring process for all roles
  • Enhanced Screening - Roles with access to sensitive data or critical systems undergo additional verification
  • Competence Assessment - Skills and competence are evaluated during hiring and reassessed annually

Security Awareness Training

Every team member receives regular training to stay informed and vigilant.

  • Onboarding Training - Security and data protection training is required for all new hires before they begin work
  • Annual Refresher - All personnel complete security awareness training at least once per year
  • Practical Coverage - Training covers data handling, threat awareness, phishing recognition, and individual responsibilities
  • Security Culture - Regular awareness activities reinforce a strong security-first mindset across the organization

Confidentiality

All personnel are bound by clear confidentiality obligations.

  • Non-disclosure Agreements - NDAs are signed by all employees and contractors before accessing any confidential information
  • Employment Terms - Security obligations are included in employment and contractor agreements
  • Policy Acknowledgment - All personnel formally acknowledge information security policies and their responsibilities

Onboarding and Offboarding

Structured processes ensure secure transitions when people join or leave the organization.

  • Security Orientation - New hires receive a dedicated security orientation as part of onboarding
  • Role-based Access - Access to systems and data is provisioned based on role requirements and the principle of least privilege
  • Offboarding Checklist - A formal checklist ensures prompt revocation of all access upon departure
  • Asset Return - Equipment and any data in the departing person’s possession are returned and verified

Clear Desk and Screen Policy

Simple workplace habits help prevent accidental data exposure.

  • Clean Desk - Physical documents and removable media must be secured when not in active use
  • Screen Lock - Workstations must be locked when left unattended, even briefly
  • Screen Sharing Precautions - Team members take care during screen sharing sessions to prevent accidental exposure of sensitive information

Disciplinary Process

Clear accountability supports a trustworthy security environment.

  • Defined Consequences - Policy violations are addressed through a clear and proportionate disciplinary process
  • Non-retaliation - Anyone who reports a security concern in good faith is protected from retaliation
  • Anonymous Reporting - Confidential and anonymous channels are available for reporting security issues or policy violations