| Acceptable Use | Clear guidelines for acceptable use of company systems, data, and technology. Read more |
| Awareness and Training | Regular security and data protection training for all employees. Read more |
| Breach Notification | Customer notification within 24 hours. Authority notification within 72 hours. Read more |
| Bug Bounty Program | Responsible disclosure program for external security researchers. View security.txt |
| Change Management | Formal change management process with peer review, testing, and approval before production deployment. Read more |
| Clean Desk and Screen Policy | Physical documents secured, screen lock required, precautions during screen sharing. Read more |
| Data Retention | Data retained only as long as necessary. Clear retention and disposal procedures. Read more |
| Disaster Recovery | Documented DR plan with defined RTO/RPO. Regular testing. Read more |
| Due Diligence | Thorough assessment of all vendors and processors before engagement. Read more |
| External Security Audit | Annual penetration test and security audit by independent external party. Read more |
| Incident Response | Structured incident response with dedicated team and defined severity levels. Read more |
| Information Classification | Three-level classification system: Confidential, Restricted, Public. Read more |
| Information Security Policy | Comprehensive ISMS aligned with ISO 27001:2022. Read more |
| NDA and Confidentiality | Non-disclosure agreements signed by all employees and contractors. Read more |
| No Customer Data in Non-Production | Production data never used in development or testing environments. Only anonymised or synthetic data used. Read more |
| Offboarding Process | Structured offboarding with prompt access revocation and asset return. Read more |
| Record Retention and Destruction | Secure destruction methods with certificate of destruction available on request. Read more |
| Risk Management | ISO 27005/31000-based risk assessment and treatment. Read more |
| System Access | Centralized access management with bi-annual reviews. Read more |
| Well Defined Roles | Roles and responsibilities for security and privacy are formalized and documented. Read more |