TRUST CENTER Overview Welcome to Thoropass’s Trust Center. Our commitment to earning your trust is embedded in every part of our business. Use this portal to learn about our governance posture as well as request access to our documentation. QUALITY STATEMENT As a customer-focused organization, Thoropass is dedicated to delivering a quality, best-in-class experience. We do this by putting the customers’ needs first and embedding quality in everything we do—our people, our process, and our technology. We are committed to consistently innovating and improving our product and service offering to consistently meet, and strive to exceed, our customers’ expectations. Eva Pittas COO/Co-founder Thoropass, Inc. Compliance TRUSTED BY Thoropass is reviewed and trusted by: Jump to a section below Risk Profile Reports Subprocessors Legal Product Security App Security Data Security AI ESG Data Privacy Corporate Security Policies Access Control Infrastructure Endpoint Security Network Security Risk Management Asset Management Incident Response BC/DR Change Management Training Physical and Environmental Continuous Monitoring Security Grades Risk Profile Data Access Level As a SaaS vendor selling to an enterprise customer, what type of data do you need access to? Restricted (i.e. highly confidential information such as PII, personal identifiable information) Impact Level What is the potential impact to your enterprise customer if the data and/or functionality you, as the vendor, are supposed to manage, is compromised? Moderate Recovery Time Objective What is your recovery time objective in case of critical failure? (e.g., your DB is deleted) 8 hours Recovery Point Objective What is your recovery point objective in case of critical failure? (e.g., your DB is deleted) 1 hour Critical Dependence Will your product be a system that your enterprise customer critically depends on? (e.g., your system is mission critical) No Third Party Dependence Are you also using other third-party services to manage or support your customers? Yes Hosting Are you hosted only on one of the major cloud providers or do you have any on-premise systems? Major Cloud Provider Back to top Reports Public Reports APEC PRP APEC PRP Auditor: NCC Group Download certification letter Download report AWS Qualified Software AWS Qualified Software Auditor: AWS Download APN badge Download ATO badge Download Healthcare badge Download Qualified badge CCPA/CPRA CCPA/CPRA Auditor: Self-Attestation Download report CREST CREST Auditor: CREST Download certificate EU-US DPF EU-US DPF Auditor: Department of Commerce (Self-Certified) Download report GDPR GDPR Auditor: Self-Attestation Download report HITRUST HITRUST Auditor: Cybercrest Download scope Download letter ISO 27017 / 27018 / 27701 ISO 27017 / 27018 / 27701 Auditor: Mastermind Assurance LLC Download certificate ISO 42001 ISO 42001 Auditor: Mastermind Assurance LLC Download certificate ISO 9001 ISO 9001 Auditor: Mastermind Assurance LLC Download certificate SIG Core SIG Core Download report APEC PRP Auditor: NCC Group Download certification letter Download report AWS Qualified Software Auditor: AWS Download APN badge Download ATO badge Download Healthcare badge Download Qualified badge CCPA/CPRA Auditor: Self-Attestation Download report CREST Auditor: CREST Download certificate EU-US DPF Auditor: Department of Commerce (Self-Certified) Download report GDPR Auditor: Self-Attestation Download report HITRUST Auditor: Cybercrest Download scope Download letter ISO 27017 / 27018 / 27701 Auditor: Mastermind Assurance LLC Download certificate ISO 42001 Auditor: Mastermind Assurance LLC Download certificate ISO 9001 Auditor: Mastermind Assurance LLC Download certificate SIG Core Download report Private Reports All private reports must be requested. Please complete the form to request access. Available reports include: Customer Responsibility Data Protection Impact Assessment (DPIA) HITRUST i1 Certified Report ISO 27001 SoA Network Diagram NIST CSF Pentest Report Security and Privacy Whitepaper SOC 2 Report System Security Plan Request Access Please provide the following details to get access to Thoropass’s Trust Center. Request Access Name * Name Name Name Company Name * Work Email * Relationship with Thoropass * CustomerProspective CustomerVendorPartnerRegulator/AuditorResearcherOther Submit Request If you are human, leave this field blank. Thoropass needs the contact information you provide to us to provide you access to our private reports. For information on this use, as well as our privacy practices and commitment to protecting your privacy, please review our Privacy Policy. Subprocessors Full List of Subprocessors (current as of February 14, 2025) Company Purpose Location Airtable Other Subprocessor – Data Analytics USA AWS Core Infrastructure – SaaS Platform USA Datadog Core Infrastructure – Monitoring and Logging USA dbt Core Infrastructure – Transformation Workflow USA Finch Core infrastructure – HRIS Integration USA FullStory Other Subprocessor – Digital Intelligence System USA Gong Other Subprocessor – Voice Recording and Transcription Services USA Google VertexAI Core Infrastructure – AI system for optional features USA Google Workspace Core Infrastructure – Customer contracts, contact information, and targeted customer notes USA Intercom Other Subprocessor – Customer facing help center USA Leen.dev Core Infrastructure – Cybersecurity Unified Data API USA Merge Core Infrastructure – Ticketing Integration USA Notion Other Subprocessor – Notion AI – search, generate, analyze content for internal knowledge base USA Okta Core Infrastructure – Single-Sign-On (SSO) Solution USA OneSchema Core Infrastructure – Data Normalization used for optional AI system feature USA OpenAI Other Subprocessor – Audit efficiency functionality USA Salesforce Core Infrastructure – CRM USA Sigma Computing Core Infrastructure – Data Analytics USA Slack Other Subprocessor – Internal communications, customer information, and targeted customer notes USA Suger Other Subprocessor – Integrations with AWS marketplace to process lead data USA Totango Other Subprocessor – Customer Success Platform USA Typeform Other Subprocessor – Customer Contracts, contact information, and targeted customer notes USA UserGems Other Subprocessor – Champion tracking service for sales and CS USA Zapier Other Subprocessor – End User Integration and Automated Workflows USA Zelta Other Subprocessor – Voice Transcription Analysis Services USA List of core infrastructure and other subprocessors utilized by us all under standard contractual clauses providing services to process information under consent or contractual obligations. Legal Cyber Insurance We have a cyber insurance plan providing coverage for security incidents. Data Processing Agreement Our Data Processing Agreement/Addendum (DPA) is located at (https://thoropass.com/data-processing-addendum/) IDR We maintain an independent/alternative dispute resolution provider designed to address complaints and provide appropriate recourse free of charge to individuals from an alternative dispute resolution provider based in the U.S. If you believe your concerns were not addressed by contacting us directly, you can contact The International Centre for Dispute Resolution® (ICDR®) (the international division of the American Arbitration Association® (AAA®)) at https://go.adr.org/privacyshield.html to file a complaint. You can also file a case by mail or email completing the appropriate Notice of Arbitration Form and forwarding it to the International Centre for Dispute Resolution: International Centre for Dispute Resolution Case Filing Services 1101 Laurel Oak Road, Suite 100 Voorhees, NJ 08043 United States Phone: +1.212.484.4181 Email box: [email protected] Thoropass provides the possibility, under certain conditions, for individuals to invoke binding arbitration. Master Service Agreement Our Master Subscription Agreement (MSA) is located at (https://thoropass.com/master-subscription-agreement/) Privacy Policy Our Privacy Policy available on our website. https://thoropass.com/privacy-policy/ Service Level Agreement We maintain service levels to guarantee the up-time of our product and how we can reach our recovery time objective. We meet our service obligations with customers as established in our project plans and strive to respond to in-app comments within two (2) business days. Terms of Service Our Terms of Service are available on our website. https://thoropass.com/terms-and-conditions/ Back to top Product Security Audit Logging Our product logs all user activity to enable easy auditing of usage patterns. Access to and activity on our systems are monitored appropriately, including maintaining audit trails for access as well as activity logs for a minimum of twelve (12) months (or other time period required by applicable law). Data Security We implement and maintain commercially reasonable administrative, technical, and physical safeguards, including procedures and practices commensurate with the level of sensitivity of customers’ data as well as the nature of its activities. We utilize these safeguards to protect the security, confidentiality, and integrity of customers’ data we process or in our possession/control including safeguards to protect the security of our systems and designed to prevent a data breach. Our product supports data security through encryption, minimum necessary principles, limited data collection, and restricted access. We ensure our customers’ data is compartmentalized (or otherwise logically distinct from) and in no way commingled with other information of ours (or our personnel, suppliers, customers or other third parties). We maintain necessary technical and organizational measures to prevent our customer data from being: accidentally (or illegally) destroyed, lost or manipulated; shared with any third parties; subject to unauthorized use or disclosure; or being processed contrary to applicable law. Our application user sessions expire sixty (60) minutes after the last activity. A warning modal will be presented before the session expires providing the user the ability to extend their session. If the user does not extend their session, they are redirected to the login page. Once logged back in, they will return to the page they were previously working on. Integrations Our platform provides monitors, which integrate with the major cloud service providers (CSP) [such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP)] and other solutions. Integrations require consent from the customer and may be somewhat configurable. We disclose exactly what will be requested from the integration in the in-app wizard. By design (and for security reasons), access is ‘read-only’ in order to obtain compliance related information for audit purposes. This access will not change or impact the configurations of the integrated solution. Generally, only the following access is required for integrations: Directory.Read.All AuditLog.Read.All IdentityProvider.Read.All Policy.Read.All Multi-Factor Authentication Users can protect their account through integrations with customer’s own multi-factor authentication solutions. Product Arhcitecture We developed a Compliance-as-a-Service platform (the Thoropass Platform) helping companies establish robust compliance practices and obtain information security certifications. We are a hybrid software and services solution helping companies design and implement policies, procedures, management practices, and controls in order to prepare for and attain various information security and privacy attestations and certifications (such as SOC 2, ISO 27001, HITRUST, and others). We guide users through the implementation process, support them through the audit process, or perform the audit according to established standards, frameworks, or criteria. Our platform leverages native services offered by Amazon Web Services (AWS) for hosting and infrastructure as well as tooling to perform critical functions such as backups, logging, and monitoring. We utilize Google Workspace to provide primary email and document repository services. We implemented Okta as our identity services provider for customers. We utilize Rippling for our own internal employees. Request our network diagram for further details. Role Based Access Control Our product offers role-based access control allowing administrators to provision different levels of access. We maintain a documented access management process to differentiate between regular and privileged account management. Authentication to our systems will require unique passwords and role-based access control, and where applicable, single sign-on (SSO). Multi-factor authentication is used for our privileged users, remote access to our systems, and access to our customer data and confidential information, where applicable. SSO Support Our product supports using SSO as the login mechanism for easy enterprise deployments. User identification and authorization is leveraged through Okta for our customer facing platform. Team Management Our product supports team management capabilities to help administrators manage user needs and permissions. Back to top App Security Responsible Disclosure We will promptly notify our customers of any known (or suspected) material vulnerabilities we discover impacting our systems or our customers’ data. Application Penetration Testing We perform at least an annual application penetration test from an independent third-party. Bot Detection We use bot detection to protect our web application from automated login attacks. Code Analysis All of our code is reviewed and tested prior to deploying into our production environment. We detect and test for vulnerabilities on components related to source code, dependencies, and infrastructure. We measure code quality, efficiency, provide context, prioritization, and remediate identified security issues. We maintain control, suggestions, and report on software dependencies. We utilize several tools such as Sonarqube, Snyk, and Renovabot to assist in code analysis. Credential Management We manage credentials and granular permissions for credentials through an enterprise level password management solution (like 1Password) through vaults. We manage all secrets using the AWS Key Management Service and rotate keys frequently. Secure Development Training All of our developers are required to participate in secure development training during onboarding and at least annually thereafter. We take a systematic approach to software development to ensure any changes are reviewed, tested, approved, and communicated to impacted parties. Prior to deployment of any changes to the production environment, changes are: Developed in a development environment segregated from production and customer data IS NOT used for testing; Reviewed by peers; Tested to confirm changes behave as expected and does not introduce any adverse effects; and Approved by authorized team members with appropriate oversight and understanding of business impact. Software Bill of Materials (SBOM) Most common applications within the Thoropass Production environment are listed within our System Security Plan. Request access to this report for additional information. Software Development Lifecycle We maintain a formal software development lifecycle. We follow industry standard secure software development practices (such as Open Web Application Security Project “OWASP”) to develop our software in a secure manner. We maintain an inventory of any open-source code or third-party libraries (collectively, “TPLs”) used in our product and have measures in place for security of the TPLs. We have controls in place to track and manage changes to software code and configurations. We maintain a documented change management process ensuring proposed changes to our systems (including any applications or software) are validated, authorized, tested in a non-production environment, and approved before deployment. The process also includes handling emergency changes to our systems. Vulnerability & Patch Management We continuously monitor for new risks to our systems (both internally and externally) including and without limitation, up-to-date controls to protect all of our systems from malware, ransomware, and unauthorized software. We utilize vulnerability tools to check our code such as Sonarqube, Snyk, and Renovabot. We also constantly monitor capacity and performance issues. We maintain vulnerability management procedures and investigating tools to continuously monitor and remediate our systems for vulnerabilities to include, but not limited to: Open ports; Misconfigurations; Insecure or missing authorization; Insecure cryptography; Cross-site scripting; Code injections; and Other vulnerabilities. Events, which reach a pre-defined threshold, are sent to an alerting console alerting the appropriate party to review and resolve. We promptly implement all security patches when issued. Web Application Firewall We maintain an Amazon Web Services (AWS) Web Application Firewall (WAF) to protect our platform. Back to top Data Security Access Monitoring We log and monitor all access attempts to our company resources. Database Access is managed through a single-controlled access point, CloudBeaver Bastion, also providing encrypted communication between external tools (like Mode and Fivetran) and our database (Snowflake). Certificates of Destruction We obtain certificates of destruction for devices storing any information from vendors performing destruction activities as applicable. Data Asset Classification Data Classifications include: Level 1 – Public Information: Information not protected from disclosure and if disclosed, will not jeopardize privacy/security of employees, customers, or partners. Examples of low-sensitive information include information made available to the public via electronic, verbal, or hard copy. ALSO INCLUDES NO INFORMATION BEING SHARED. Level 2 – Business Confidential Information: Confidential information intended for business use exempt from public disclosure since disclosure would impact the privacy/security of employees, customers, or partners. If the information is made available to the public or partners, the information disclosed to external parties must abide by our disclosure policies/procedures. Level 3 – Sensitive Information: Extremely sensitive information intended to be used by authorized individuals only. Typically, this information is exempt from public disclosure. Users are notified when accessing this data (such as personally identifiable information). Data Backups We perform daily backups on the application’s database and replicate critical data to another AWS Region. We ensure data is synched up across multiple locations and can be retrieved within our recovery time objective if a failure does occur. Data Erasure We can delete customer data upon request and will ensure the data is erased within a set timeframe. We apply industry standard data sanitization practices (such as NIST 800-88 Guidelines for Media Sanitization) to our systems to ensure the secure destruction of all our customers’ data as soon as it is no longer required for a valid business purpose. We extend data sanitization to all electronically stored information, paper assets, and other physical media (such as backup tapes or external drives) under our possession and control. Encryption-at-rest We encrypt all of our data at rest using a generally recognized encryption standard (such as Federal Information Processing Standards (FIPS) 140 compliant encryption – Advanced Encryption Standard (AES)) to include encryption of all Mobile Devices (if applicable), removable media, backup copies, and systems containing (or processing) our customers’ data with a key size of at least 256 bits. Keys are rotated according to best practices. Encryption-in-transit We encrypt all of our data in transit using a generally recognized encryption standard to include encryption of all Mobile Devices (if applicable), removable media, backup copies, and systems containing (or processing) our customers’ data with Transport Layer Security (TLS) 1.2 or above utilizing strong encryption. Keys are rotated according to best practices. Geographic Location of Data We are a remote first company and have employees all over the world. Customer data is only stored within the AWS environment with the US. Information Disclosure Protection We abide by our privacy policy, data privacy framework, and data protection agreement as it relates to information disclosure practices. Media Data Retention We abide by our data retention policy concerning any data stored on media. Media Protection We restrict removable media within technical controls assigned to laptops. We maintain only digital data assets of our platform within AWS. Physical Media Disposal We maintain secure media disposal procedures as necessary. Physical Security Physical access is restricted to our office to authorized employees and visitors. Visitors must be logged and escorted at all times in restricted areas. Sensitive Data Management We ensure we abide by appropriate sensitive data management processes to ensure sensitive data is not exposed to unauthorized users. Back to top AI AI Governance We strive to use or deploy trustworthy AI systems abiding by regulations (such as the EU AI Act), standards (such as NIST AI RMF and ISO 42001), and contractual obligations. We utilize artificial intelligence (AI) technologies, specifically Google Vertex AI and Azure OpenAI, to enhance and improve our platform and services. The AI models are trained using customer-provided documents, such as policies, procedures, and audit reports, to enable features like automated question answering and relevant information extraction to assist our auditors. The primary purpose of using AI is to facilitate and assist customers in navigating the compliance process. By training AI models on customer-provided documents, we aim to automate the extraction of relevant information and provide accurate responses to questionnaire items and audit criteria, thereby reducing the manual effort required by our customers and auditors. By uploading documents to our platform, customers consent to the use of their data for the purpose of improving our services, as outlined in our Privacy Policy, Terms of Service, and Master Subscription Agreement; however, customers may opt-out of having their documents used for AI training by contacting our support team at [email protected]. AI Monitoring We are committed to being transparent about our AI use and using our AI models in a fair and unbiased manner. We regularly monitor and assess our AI systems for potential biases or discriminatory outcomes and take appropriate measures to mitigate any identified issues. Any disclosures about any modifications will be made in accordance to applicable law and in a manner balancing transparency with the protection of our intellectual property and confidential information. AI Risk Management We integrate AI risks into existing risk management processes by conducting AI specific risk analysis as well as determining contributing factors to AI risks. Some AI risks we consider, but not limited to, include: accuracy, robustness, reliability, privacy, interpretability, safety, and bias. AI risks are classified according to existing risk levels except for those AI systems considered prohibited (and classified as such) by regulations such as the EU AI Act. We mitigate risks to an acceptable level. We leverage the NIST AI RMF when evaluating risks of AI systems to include the following activities: govern; map; measure; and manage (a subset of measure). While we strive for accuracy and reliability when using AI-powered features, we acknowledge AI technology is still evolving and may have limitations. Therefore, we provide human oversight and review mechanisms to validate the outputs generated by our AI models. This validation process is to allow for the continuous appropriate use of the AI system’s outputs and to mitigate potential risks. Customers are encouraged to review and approve all AI-generated responses before relying on them for compliance purposes. AI Security We implement robust privacy and security safeguards to protect the data used for AI training and the personal information of our customers. These safeguards include: Access controls and strict data access policies based on the principle of least privilege Encryption of data in transit and at rest Regular security audits and assessments Employee training on data privacy and security best practices Contracts with sub-processors including data protection obligations For more information about our privacy and security practices, please refer to this Trust Center. AI Third Party Contracts and Diligence All AI-related data processing and storage is performed within the Google Vertex AI platform, which is hosted in Google Cloud Platform (GCP) data centers located in the United States and OpenAI, which is hosted in Azure within Microsoft’s data centers located in the United States. Learn more about Google Cloud’s and Azure OpenAI’s Data Processing & Security measures here: https://cloud.google.com/terms/data-processing-addendum and [https://learn.microsoft.com/en-us/legal/cognitive-services/openai/data-privacy] (https://learn.microsoft.com/en-us/legal/cognitive-services/openai/data-privacy), respectively. We implement appropriate technical and organizational measures to ensure the security and confidentiality of the data processed by our AI models. AI Training Data and Bias To train our AI models, we use customer-provided documents, which may contain personal information; however, we strive to follow data protection principles with respect to the use of personal data in the training process and encourage our customers to provide sanitized versions of their documents whenever possible. The types of personal data present in these documents may include names, email addresses, phone numbers, addresses, and other employee-related information. Such data is used in accordance with applicable data protection laws and our data governance practices. AI Usage Training We do not develop AI systems, but rather, we are a user of AI systems already developed by other third parties. We may use (or integrate) these AI systems into our operations, processes, or platform. We implement accountability structures to ensure appropriate teams and individuals are empowered, responsible, and trained in mapping, measuring, and managing AI risks. We ensure roles/responsibilities and lines of communication over AI risks are documented and are clear to individuals/teams throughout our organization. AI risk management training is provided to enable personnel (and partners) to perform their duties/responsibilities consistent with related. policies, procedures, and agreements. Responsible AI Statement Our Executive Management Team is committed to responsible AI use and implementation of AI systems by ensuring privacy, security, accessibility, and digital safety as required. Our Executive Management Team: Ensures roles and responsibilities of AI governance are established and understood; Establishes organizational risk strategy and tolerances with stakeholders; Provides knowledge resources/training to foster/promote a culture of continuous ethical AI behavior; Approves policies to manage third party AI risk to ensure end-to-end accountability; and Understands differences in norms/expectations across countries. Our Executive Management Team determines if AI is a suitable solution and is ultimately responsible for AI risks and mitigations. They will assess risk tolerance and approve/accept risks not able to be mitigated to an acceptable level. They will take responsibility for decisions about risks associated with AI system use and deployment. Back to top ESG Anit-Bribery and Corruption We are committed to conducting business in an ethical and compliant manner abiding by all applicable regulations as well as contractual obligations. Our executive management team requires Thoropass, its employees, and anyone acting on behalf of Thoropass to abide by its policies and all applicable laws in any country where we operate, including specific anti-corruption laws. The purpose of this Anti-Bribery/Anti-Corruption (ABAC) Policy is to implement requirements to support our compliance with applicable laws relating to bribery and corruption to include, but not limited to, the Foreign Corrupt Practices Act (US) and the Bribery Act (UK). Anti-corruption laws make it illegal for us (or anyone acting on Thoropass’s behalf) to bribe any person (or entity) to accept a bribe from any person (or entity). We have zero tolerance for any bribery/corruption and will implement training along with internal controls to proactively manage risks of bribery/corruption. We are also required to keep accurate records to maintain proper internal accounting controls. Our officers, directors, employees, contractors, consultants, agents, (collectively, “employees”), and third-parties are required to abide by applicable laws related to bribery and corruption. Employees and third-parties MUST NOT provide (or offer to provide) a payment (or other incentive) to anyone in exchange for gaining any sort of improper benefit. Payments or incentives can be items other than money such as gifts, services, job offers, loans, travel expenses, and entertainment. Gifts may be anything of value given (or received) from customers (and others we do business with) as a result of a business relationship for which the recipient does not pay fair market value. Employees and third-parties MUST NOT offer anything of value in an attempt to improperly influence any person in the private/public sector or government official. In addition, employees and third-parties MUST NOT accept anything of value in order to provide an improper benefit. We prohibit payments offered to a person in government (or other individual) to secure (or speed up) a government process or decision. All financial records MUST accurately reflect all transactions by (or behalf of) Thoropass. ESG In Business Practice We apply environmental, social, and governance (ESG) principles into our business model and operations. Our board of directors ensures ESG matters are considered in our strategy as well as provide effective governance over ESG. We performed a step-by-step review abiding by a standardized ESG Oversight Framework to understand the ESG landscape, understand material ESG matters requiring board oversight, determine allocation of oversight responsibilities, conduct an ESG assessment, plan resource requirements, and monitor/report ESG matters to the board. Whistleblowing Program We have a genuine interest in protecting the integrity of our workplace, but this is only achievable if employees speak up when our integrity might be compromised. Employees are expected to know and comply with our policies and to use their best judgment when reporting any form of fraud (or misconduct). If there is a reasonable basis to believe an employee (or another person related to Thoropass) has violated the law (or organizational policy) or has contributed to unethical behavior, then we strongly encourage employees to speak up. If an employee is ever told to “keep quiet” about a suspected violation, then it is the employee’s responsibility to report the suspected violation to a ‘Speak Up’ representative and to explicitly include in the report ‘the employee has been asked to keep quiet about the matter’. If one employee approaches another about potential fraud or non-compliance, that person should be encouraged to use the Speak Up Policy to report their concerns. In case the employee accused of misconduct is in a senior position (or is a reporting staff member), the employee should report the issue to the Data Protection Officer/CISO. Employees only need to Speak Up and we will investigate for them. Employees do not need to have proof and can be mistaken. By simply holding others accountable within Thoropass, we can avoid financial (or reputational risk) resulting from unreported harmful activity. By choosing to Speak Up, employees directly contribute to making our workplace more honest, fair, and safe for everyone. Back to top Data Privacy Cookies COOKIES AND SIMILAR TECHNOLOGIES We use cookies, web beacons, and similar technologies to operate our Service and to help collect data, including usage data, identifiers, and device information. What are cookies and similar technologies? Cookies are small text files placed by a website and stored by your browser on your device. A cookie can later be read when your browser connects to a web server in the same domain that placed the cookie. The text in a cookie contains a string of numbers and letters that may uniquely identify your device and can contain other information as well. This allows the web server to recognize your browser over time, each time it connects to that web server. Web beacons are electronic images (also called single-pixel or clear GIFs) that are contained within a website or email. When your browser opens a webpage or email that contains a web beacon, it automatically connects to the web server that hosts the image (typically operated by a third party). This allows that web server to log information about your device and to set and read its own cookies. In the same way, third-party content on our Site (such as embedded videos, plug-ins, or ads) results in your browser connecting to the third-party web server that hosts that content. We may also include web beacons in email messages to tell us if you open and act on them. How do we and our partners use cookies and similar technologies? We, and our analytics and advertising partners, use these technologies on our Service to collect information (such as the pages you visit, the links you click on, and similar usage information, identifiers, and device information) when you use the Service. This information is used to store your preferences and settings, enable you to sign-in, analyze how our Service performs, track your interaction with the Service, develop inferences, show you advertising about the Service after you visit our Website, combat fraud, and fulfill other legitimate purposes. What controls are available? ADVERTISING CONTROLS. Our advertising partners may participate in associations that provide simple ways to opt out of ad targeting, which you can access at: United States: Network Advertising Initiative (NAI)(HTTP://optout.networkadvertising.org) and Digital Advertising Alliance (DAA) (HTTP://optout.aboutads.info/) Canada: Digital Advertising Alliance of Canada (HTTPS://youradchoices.ca/) Europe: European Digital Advertising Alliance (HTTP://www.youronlinechoices.com/) These choices are specific to the browser you are using. If you access the Service from other devices or browsers, take these actions from those systems to ensure your choices apply to the data collected when you use those systems. BROWSER COOKIE CONTROLS. Most web browsers are set to accept cookies by default. If you prefer, you can go to your browser settings to learn how to delete or reject cookies. If you choose to delete or reject cookies, this could affect certain features or services of our website. If you choose to delete cookies, settings and preferences controlled by those cookies, including advertising preferences, may be deleted and may need to be recreated. EMAIL WEB BEACONS. Most email clients have settings which allow you to prevent the automatic downloading of images, including Web Beacons, which prevents the automatic connection to the web servers that host those images. DO NOT TRACK. Some browsers have incorporated “Do Not Track” (DNT) features that can send a signal to the websites you visit indicating you do not wish to be tracked. Because there is not a common understanding of how to interpret the DNT signal, our Service does not currently respond to browser DNT signals. Instead, you can use a range of other tools to control data collection and use, including the cookie controls and advertising controls described above. Data Breach Notifications We will make data breach notifications to impacted customers for any breach of customer information according to regulatory requirements and contractual obligations. Data Into System COLLECTION OF PERSONAL INFORMATION The personal data we collect depends on how you interact with us, the services you use, and the choices you make. We collect information about you from different sources and in various ways when you use our services, including information you provide directly, information collected automatically, third-party data sources, and data we infer or generate from other data. Information you provide directly. We collect personal data you provide to us. For example: CONTACT INFORMATION. We collect name, username or alias, email address, postal address, phone number, fax number. DEMOGRAPHIC AND PREFERENCE DATA. In some cases, such as when you register or participate in surveys, we request that you provide details on your interests, preferences, or other demographic information. PAYMENT INFORMATION. If you make a purchase or other financial transaction, we collect credit card numbers, financial account information, and other payment details. CONTENT AND FILES. We collect documents or other files you upload to the Service or otherwise provide to us; and if you send us email messages or other communications, we collect and retain those communications. Information we collect automatically. When you use our services, we collect some information automatically. For example: IDENTIFIERS AND DEVICE INFORMATION. When you access the Service, our web servers automatically log your internet protocol (IP) address and information about your device, including device identifiers (such as MAC address); device type; and your device’s operating system, browser, and other software including type, version, language, settings, and configuration. As further described in the Cookie section, our Service stores and retrieves cookie identifiers and other data. GEOLOCATION DATA. Depending on your device and browser settings, we collect geolocation data when you use the Service. USAGE DATA. We automatically log your activity on the Service, including the URL of the website from which you came to the Service, pages you viewed, how long you spent on a page, cursor movements, text input, access times, and other details about your use of and actions on the Service. INFORMATION WE OBTAIN FROM THIRD-PARTY SOURCES. We may receive personal information about you from data brokers, partners, service providers, social networks, including publicly available sources. We may combine this information with other personal information we maintain about you. When you are asked to provide personal information, you may decline and you may use web browser or operating system controls to prevent certain types of automatic data collection, but if you choose not to provide or allow information that is necessary for the Service, the Service or certain aspects of it may not be available or fully functional. Data Out of System USE OF PERSONAL INFORMATION We use the personal data we collect for purposes described here or otherwise disclosed to you. For example, we use each of the categories of personal information for the following purposes: PRODUCT AND SERVICE DELIVERY. To provide and deliver our Service, including troubleshooting, improving, and personalizing the services. BUSINESS OPERATIONS. To operate our business, such as billing, accounting, improving our internal operations, securing our systems, detecting fraudulent or illegal activity, and meeting our legal obligations. PERSONALIZATION. To understand you and your preferences to enhance your experience and enjoyment using the Service. CUSTOMER SUPPORT. To provide customer support and respond to your questions. COMMUNICATIONS. To send you information, including confirmations, invoices, technical notices, updates, security alerts, and support and administrative messages. MARKETING. To communicate with you about new services, offers, promotions, rewards, contests, upcoming events, and other information about our Services and those of our selected partners. ADVERTISING. To display advertising to you. DISCLOSURE OF PERSONAL INFORMATION We will disclose your personal information to third parties with your consent or as necessary to complete your transactions or provide the services you have requested or authorized. For example, when you provide payment data to make a purchase, we will share that data with banks and other entities as necessary for payment processing, fraud prevention, credit risk reduction, or other related financial services. In addition, we share each of the categories of personal data described above for the following business purposes: We may disclose personal information to third-party service providers (e.g., data storage and processing facilities, third-party vendors, consultants) that assist us in our work. We limit the personal information provided to these service providers to that which is reasonably necessary for them to perform their functions. We may also disclose personal information, including to law enforcement or other government agencies, if we believe that doing so is legally required or is in our interest to protect our property or other legal rights (including, but not limited to, enforcement of our agreements), or the rights, property, or safety of others. In addition, we may disclose personal information about our users as part of any merger, acquisition, debt financing, sale of company assets, or similar transaction, as well as in the event of an insolvency, bankruptcy, or receivership in which personal information could be transferred to third parties as one of our business assets. Third-party analytics and advertising companies, acting on our behalf as our service providers, also collect personal information through our Service as described in the Cookies section. For example, we use an analytics tool from FullStory to help us better understand how our Service is used. Likewise, we use Google Analytics on our website to help us understand how users interact with our website; you can learn how Google collects and uses information at: (HTTPS://www.google.com/policies/privacy/partners.) Finally, we may share de-identified information in accordance with applicable law. Please note that the Service may contain links to other Websites, products, or services that we do not own or operate. If you choose to visit or use any third-party products or services, please be aware that this Policy will not apply to your activities or any information you disclose while using third-party products or services or otherwise interacting with third parties. CHOICE & CONTROL OF PERSONAL INFORMATION ACCESS, CORRECTION, AND DELETION. You can access, correct, or delete certain personal information you have provided logging into the Service with your account. If you are unable to access certain personal information via your account, you can request access by contacting us [email protected]; however, to the extent permitted by applicable law, we reserve the right to decline requests that are unreasonable or excessive, where providing the data would be prohibited by law or could adversely affect the privacy or other rights of another person, where deleting data would interfere with a legal or business obligation that requires retention of the data, or where we are unable to authenticate you as the person to whom the data relates. COMMUNICATIONS PREFERENCES. If you receive commercial email from us, you may unsubscribe at any time by following the instructions contained within the email. You may also opt-out from receiving commercial email from us by sending us an email or by writing to us at [email protected]. CHOICES FOR COOKIES AND SIMILAR TECHNOLOGIES. See the Cookies section for choices about cookies and other analytics and advertising controls. Data Privacy Officer We have a formally assigned Data Protection Officer (DPO). The DPO can be contacted at [email protected]. The Data Protection Officer is assigned the following responsibilities: developing and implementing our data protection program informing and advising us, and our employees who carry out data processing operations, about their obligations under the GDPR and any applicable data protection legal framework or law monitoring compliance with the GDPR and any other applicable data protection provisions monitoring our strategies for the protection of personal data, including the allocation of responsibilities, awareness-raising, and training of staff involved in the processing operations, and related verifications advising with the data protection impact assessment and implementations thereof, pursuant to Art. 35 GDPR cooperating with the supervisory authorities and legal services acting as a contact point for the supervisory authority on issues related to data processing, including prior consultation on the data protection impact assessment pursuant to Article 36 GDPR and, where appropriate, advising on all other issues acting as a contact point for the exercise of data subjects’ rights under articles 12-23 GDPR, and processing their inquiries related to data processing activities developing our vDPO services for our customers providing data protection training internally and externally (including training materials) participating in data protection activities (i.e., work groups, webinars, blogs, etc.) advising our customers on any data protection issues Employee Privacy Training All employees and contracting staff are required to take security awareness and privacy related training during onboarding and annually thereafter. Additional role based related security and privacy training is provided for employees based on their job duties and responsibilities. Back to top Corporate Security Asset Management Practices We maintain formal asset management practices to include maintaining a comprehensive asset inventory. We maintain an asset inventory accurately reflecting our systems used to process our customers’ data to include information systems, cloud services, and relevant infrastructure. We maintain an accounting of assets when an asset is installed, removed, or updated. Email Protection We use Google Workspace with an integrated email gateway to filter out suspicious emails. Employee Handbook All of our employees are provided and must sign for an Employee Handbook providing information on their job expectations. Employee Training We have a comprehensive employee training program including in-person training, video training, and a dedicated security portal. All employees must complete security awareness and privacy training during onboarding and annually thereafter. Role-based training is provided based on employees’ job responsibilities/duties. We maintain an awareness and training program for our representatives who may have access to our customers’ data. This training incorporates and reflects requirements of Data Privacy Laws as well as information security industry standards and best practices (to include, but not limited to: phishing; social engineering; strong passwords; removable media; and emerging threats/trends). HR Security We maintain human resource security through our human resources department and coordination with security/privacy resources. We maintain and follow screening procedures and industry standard employment verification requirements for all new employees and contractors hired, including conducting background checks (such as criminal background checks) to the extent permitted by local laws and proof of identity validation, and additional checks deemed necessary. We periodically validate these requirements and perform rechecks as deemed necessary. We ensure our representatives authorized to process our customer data have committed in writing to maintaining the confidentiality of this data or are under an appropriate statutory obligation of confidentiality. Incident Response We have a dedicated incidence response team and plan. More information is available in our Incident Response Policy. Insider Threat Program We maintain an insider threat program to help ensure employees are not abusing their access to sensitive data. We monitor sensitive data activity and train our employees on ‘red flags’ of insider threats. Anyone identifying a violation (or suspected violation) of policies/procedures are required to notify the Data Protection Officer/CISO (or immediate manager). Internal Assessments We perform annual internal assessments to include compliance, risk, and penetration testing activities. We also have independent auditors perform assessments of our security and privacy processes. Internal SSO We require employees to use SSO to login into all company resources. Penetration Testing We perform an annual penetration test. See Penetration Test Report for more information. Personnel Termination/Transfer We terminate access to any systems (and data) within twenty-four (24) hours of employees leaving the organization. We require any company issued assets to be returned and notify employees of their obligations to maintain confidentially under their non-disclosure/confidentiality agreements. Security Operations Center We utilize native AWS and Orca Security solutions to provide us Security Operations Center (SOC) capabilities such as alerting, analysis of nefarious behaviors, and ability to block/restrict access. Third Party Personnel Program We maintain a program to ensure any third parties having any access to our systems/data must abide by our security/privacy policies. Back to top Policies Acceptable Use Policy We maintain a formal Acceptable Use Policy. All employees must sign and adhere to the Acceptable Use Policy prior to obtaining access to our information systems and data assets. Access Control Policy We maintain a formal Access Control Policy. We implement role-based access restrictions on all information systems and data assets. Anti-Malicious Software Policy We maintain a formal Anti-Malicious Software Policy. All our issued corporate laptops are installed with anti-malicious software (such as Bitdefender), which is monitored and can’t be disabled by the end-user. Our application utilizes solutions to continuously scan documents and alerts are made if a vulnerability is detected. Asset Authorization and Monitoring Policy We maintain Asset Authorization and Monitoring Policy describing how we authorize and monitor the use of company assets. Asset Management Policy We maintain an Asset Management Policy. We maintain an updated inventory of all assets. Audit and Accountability Policy We maintain an Audit and Accountability Policy describing how we maintain audit logs and reviews them for security incidents. Awareness and Training Policy We maintain a Security Awareness Training Policy describing how we educate employees on security best practices. Our training program also includes privacy, AI, and quality content to name a few additional topic areas covered. Backup Policy We maintain a Backup Policy. We synchronize customer data across multiple regions to ensure redundancy and to meet service level agreements. Bring Your Own Device (BYOD) Policy We maintain a Bring Your Own Device (BYOD) policy describing how employees are restricted from using non-company owned mobile devices to access company data. Business Continuity/Disaster Recovery (BC/DR) Policy We maintain a Business Continuity and Disaster Recovery Policy. We maintain, document, approve, and review policies and procedures for business continuity and disaster recovery annually. The business continuity plan ensures the availability and prompt restoration of our customers’ data to include appropriate security measures for backups and networks. We perform annual Business Continuity and Disaster Recovery testing and mitigate any deficiencies identified. Configuration Management Policy We maintain a Configuration Management Policy describing how we manage the configurations of company assets. Contingency Planning Policy We maintain a Contingency Planning Policy describing how we plan for and respond to incidents disrupting business operations. Data Sanitization Policy We maintain a Data Sanitization Policy. We wipe data from storage media when no longer needed or required per regulations (or contractual obligations). Data Security Policy We maintain a Data Security Policy. See Data Security Card for additional information. Encryption Policy We maintain an Encryption Policy. We encrypt data at rest and in transit. See Data Security Card for additional information. Identification and Authentication Policy We maintain an Identification and Authentication Policy describing how we verify the identity of users and grant them access to company assets. Incident Response Policy We maintain an Incident Response Policy. Incident Response includes identifying, containing, eradicating, recovering, reporting, performing root cause analysis, and notification as necessary. We maintain a security incident response plan including mitigation, remediation, customer communication, and a post-incident review in the event of an actual (or suspected) data breach (or other significant security incident). Information Management System (IMS) Policy We utilize our own Thoropass platform as an Integrated Management System (IMS) and compliance solution to organize our compliance as well as demonstrate accountability activities. Information Security Policy We maintain an Information Security Policy. The Information Security Policy is separated into several specific policies as noted. Internal and External Communication Policy We have implemented various methods of internal communication to help employees understand their individual roles/responsibilities and communicate significant events in a timely manner. We rely on Slack channels to communicate changes or issues with system availability or security. We communicate with customers and third parties through various web-based conferencing platforms such as Zoom and Microsoft teams. Communication is conducted on an ‘as needed’ basis based on customer or third-party requests. Any incidents impacting the security, confidentiality, or privacy of customers’ information are communicated to appropriate third parties in a timely manner. Maintenance Policy We maintain a Maintenance Policy describing how we maintain company assets, such as software updates and hardware maintenance. Media Protection Policy We maintain a Media Protection Policy describing how we protect company media such as hard drives or USB drives. Network Security Policy We maintain a Network Security Policy. Our Network Security Policy describes our network security controls used to protect the network, such as hardware firewalls, DNS filtering, and intrusion detection systems. Other Policies We maintain a Trade and Sanction Compliance Program Policy available upon request. Password Policy We maintain a Password Policy. See https://app.safebase.io/portal?itemUid=af119565-5dc2-4aec-bab6-21f9cf5ae315&source=click for additional information. Personnel Security Policy We maintain a Personnel Security Policy describing how we screen, train, and manage employees to reduce the risk of insider threats. Physical Security Policy We maintain a Physical Security policy. Physical security controls are in place at our office. PII Processing Policy We maintain a Privacy Policy describing how we process personally identifiable information (PII) in compliance with privacy regulations such as the GDPR and CCPA. Planning Policy We maintain a Planning Policy describing how we plan for security incidents and implement security controls. Request access to our private documents to access our System Security Plan (SSP) Program Management Policy We maintain a Program Management Policy describing how we manage our security program, such as assigning roles and responsibilities. Risk Assessment/Management Policy We maintain a Risk Management Policy. Security and Risk Governance is led by the Chief Information Security Officer (CISO) and Privacy Risk Governance is the responsibility of the Data Protection Officer (DPO) or representative delegates. We perform risk assessments and maintain risks on a continuous basis. We conduct quarterly risk meetings to discuss new risks identified and the status of mitigation activities for current risks. Software Development Lifecycle Policy We maintain a Software Development Lifecycle Policy. See App Security for additional information. Supply Chain Risk Management Policy We maintain a Third Party Risk Management Policy describing how we assess and manage risks associated with third-party vendors. System and Communications Protection Policy We maintain a System and Communications Protection Policy describing how we protect our systems and communications from unauthorized access. System and Information Integrity Policy We maintain a System and Information Integrity Policy describing how we maintain the integrity of our systems and information. Third Party Personnel Policy We maintain a Third Party Personnel Policy. We perform comprehensive vendor due diligence reviews to include several areas such as OFAC, security, privacy, reputation, and others. We maintain a compliance program to conduct due diligence and monitor the security and processing activities of sub-processors or subcontractors. We require sub-processors to implement and maintain reasonable administrative, technical, and physical safeguards to protect the security, confidentiality, and integrity of any customers’ data the sub-processor may process in the course of providing services to us. We ensure security and data privacy requirements are included in third party contracts and these commitments are reasonably monitored throughout the term of services provided. Vulnerability Management Policy We maintain a Vulnerability Management Policy. See App Security for additional information. Back to top Access Control Access Log Management We manage access logs as a critical part of our security program in order to provide a record of who accessed what and when. Our access logs assist us in compliance, incident response, and general security monitoring Automated Account Management We manage automated account management, where possible, through our SSO solutions to help ensure employees have the right access to the right resources at the right time. Bring Your Own Device (BYOD) We maintain a Bring Your Own Device (BYOD) policy describing how employees are restricted from using non-company owned mobile devices to access company data. Data Access We will not process any customer personal data without authorization. Our employees are obligated to maintain the confidentiality of any of our customers’ personal data and this obligation continues even after their engagement with us ends. We strictly monitor access to customer data and only permit it on an as-needed basis. We employ least privilege access through various mechanisms, whether group or individual entitlement to systems or data stores. We ensure we have access controls designed to limit access to our customer’s data to our representatives on a need-to-know basis and only as necessary for the performance of the services under our agreements. We remove or revoke access within twenty-four (24) hours after the termination of employment, termination (or expiration) of services, or reassignment of duties. We perform quarterly access reviews for privileged and other accounts having access to our customers’ data or to our systems. Device Lock We maintain device locks as a critical feature to ensure devices are secure in the event they are lost or stolen. When a session is inactive for ten (10) minutes, the device lock will automatically initiate, requiring a user to authenticate themselves in order to access a device (such as a laptop). Internal Single-Sign-On (SSO) We utilize a Single Sign-On (SSO) solution to enable a user to authenticate once and gain access to resources of multiple software systems for internal employees. Least Privilege We abide by the principle of least privilege limiting user access rights to only what are strictly required to do the user’s job. Logging We keep detailed logs of all activities on company resources and review logs to identify irregularities as needed. We utilize tools such as Datadog for logging and to monitor for performance. Mobile Device Access We maintain a mobile device management (MDM) solution to manage access to mobile devices. Password Manager We utilize a password manager solution to store and manage passwords where applicable. The solution can help users generate strong passwords and store them securely. Password Security We enforce stringent password security policies and Single Sign-On (SSO) based access for all our employees and users for the platform utilizing a SSO solution. Multi-Factor Authentication (MFA) is available through integrations with customer owned MFA solutions. We maintain password management measures requiring, at a minimum, reasonable password complexity and account lockouts after periods of inactivity as well as multiple unsuccessful attempts for all users. We require all third party-supplied default passwords and other security parameters on any of our systems (or third-party software) be replaced with a unique password prior to processing our customers’ data. Our password policy is as follows: Minimum Length: Eight (8) characters for MFA users; Twelve (12) characters for non-MFA users Complexity: All require lower, upper, number, and symbols. Passwords can not contain part of username, first name, or last name. Password Age: For MFA users, the last four (4) previous passwords can not be used and a password must be used for at least three (3) hours before changing. For non-MFA, the last fifteen (15) passwords can not be used and a password must be used for at least three (3) hours before changing. Passwords expire after ninety (90) days (except for accounts with MFA enabled, passwords will expire after one hundred eighty (180) days). Lockout: Passwords will lock after ten (10) unsuccessful attempts and accounts will remain locked for sixty (60) minutes. Lockouts are logged. Inactivity Session TimeOut: The application maintains an application session time-out of sixty (60) minutes of inactivity for customers utilizing Okta and twenty-four (24) hours for customers using Cognito. MFA code is required every twenty-four (24) hours within the application, except for users with limited/restricted viewer roles (i.e. view policies/procedures and training content only). Privilege Escalation Process We abide by best practices for privilege escalation in order for users to gain more access to a system than they were initially granted. We manage this through establishing separate normal user accounts and privilege user accounts, where applicable. Our MDM solution also requires users to request escalation of their privileges if they are performing an elevated activity on their laptops. Remote Access We are a remote first company and provide secure access for remote users to utilize approved resources. Separation of Duties We maintain separation of duties as best security practices distributing tasks and privileges for specific processes among multiple people (or systems) to prevent fraud (or errors). Session Termination We maintain session terminations to automatically log a user out of a system after a certain period of inactivity. System Use Notification We maintain system use notification, where applicable, alerting users when someone logs into their account from a new device (or location). Back to top Infrastructure Status Monitoring We maintain status monitoring and notify customers of any issues our platform is encountering. Amazon Web Services We host our applications and data on Amazon Web Services (East US Region). All services in our cloud platform run in a least privileged state and compliance is validated by various tools within the cloud providers platform. Should a service fall out of compliance, it is immediately alerted for an engineer to review and resolve. Anti-DDoS We utilize an anti-DDOS system to provide guaranteed up time for our product. BC/DR We perform daily backups on the application’s database and replicate critical data to another AWS Region. We have a tested and detailed business continuity and disaster recovery plan in the event of a major disruption to one of our key service providers. Capacity Planning & Management We monitor our systems to ensure appropriate capacity is available and leverage the scalability of our AWS environment as needed. Cloud Service Providers Our platform leverages AWS. See our sub-processor list for additional information, visit Subprocessors. Environment Segregation We maintain separate production, release candidate, and development environments within our platform. Infrastructure Security We maintain a zero-trust policy architecture. Access is provided through a single sign-on and multi-factor authentication solution, Okta. We ensure a secure baseline configuration is established, maintained, and reviewed periodically for all of our systems used to provide secure products (or services) to our customers. All of our endpoints are centrally managed, including disk encryption, idle session time-out, firewall enabled, USB write blocking and anti-virus / anti-malware is installed. Our devices are subject to centralized patching. Network Time Protocol Our platform leverages AWS Fargate to manage operating systems and hosts. AWS Fargate utilizes a network time protocol (NTP) server managed by AWS through the AWS shared security model. https://aws.amazon.com/about-aws/whats-new/2021/09/monitoring-clock-aws-fargate-amazon-ecs/ Separate Production Environment We maintain completely separate production and development environments to ensure product stability. Time Synchronization Our platform leverages AWS Fargate to manage operating systems and hosts. AWS Fargate utilizes a network time protocol (NTP) server managed by AWS through the AWS shared security model. https://aws.amazon.com/about-aws/whats-new/2021/09/monitoring-clock-aws-fargate-amazon-ecs/ Back to top Endpoint Security Anti-Malware We utilize anti-malware solutions (such as BitDefender) to protect computers from malware and other threats. Disk Encryption We use FileVault and BitLocker (as applicable) to encrypt the data on our corporate laptops. DNS Filtering We have implemented a DNS Filtering solution to block access to known malicious websites. This solution provides automated content filtering and threat detection. Endpoint Detection & Response We utilize endpoint detection and response solutions. Mobile Device Management We utilize mobile device management (MDM) solutions such as Rippling across Windows and Mac company owned devices, as applicable. We do not use mobile devices, tablets, personal laptops, or other mobile computing devices (i.e. Mobile Devices) to process our customers’ data without our customers’ prior written consent. In the event our customer provides consent, we will ensure safeguards are implemented and Mobile Devices will utilize: Whole-disk encryption using an industry standard method; Automatic locking of the Mobile Device after a period of inactivity of ten (10) minutes or less; Password login using at least a six (6)-digit numeric password; and Remote-wipe capability in the event of a loss or theft of the Mobile Device. Portable Storage Management We restrict the use of portable storage devices. Software Firewall We leverage integrated software firewalls within mobile devices to monitor and control incoming/outgoing network traffic. Threat Detection We utilize native AWS solutions, Orca Security, and DNSFilter to provide the ability to detect threats including Advanced Persistent Threats (APTs). Back to top Network Security Data Loss Prevention We have a mobile device management (MDM) solution in place to restrict the use of portable storage devices and enforce standard access rights for users on local systems (as opposed to admin rights) if not exempted by the user’s roles/requirements. We maintain strict policies restricting the sharing or divulging of sensitive or confidential information. We also implemented a content-filtering and web threat detection solution to prevent the unauthorized use, access, disclosure (or loss) of our customers’ data by email and other means. Distributed Denial of Service Protection (Anti-DDoS) We leverage DDoS protection provided by AWS. Firewall We maintain an Amazon Web Services (AWS) Web Application Firewall (WAF) to protect our application platform. IDS/IPS We currently leverage native AWS intrusion detection solution (IDS) and intrusion prevention solution (IPS) and utilize Orca Security to enhance our ability to identify inbound and outbound traffic, which may be of a malicious nature. Our systems protect our critical infrastructure, data, and vulnerable applications in real-time from known, undisclosed, and unknown vulnerabilities without adversely affecting network performance. Security Information and Event Management We utilize DataDog and Orca Security as our security information and event management (SIEM) tool to monitor for security events in our infrastructure. Spoofing Protection We leverage spoofing protection services offered through Google Workspace. Traffic Filtering We control traffic in and out of our AWS environment as well as utilize content filtering solutions on mobile devices through an agent and existing firewall settings. User traffic is funneled through a managed DNS gateway utilizing a roaming client. Virtual Private Cloud We utilize a private virtual cloud to ensure that all of our computer needs are done in a secured environment, separate from other public cloud tenants. Wireless Security We mostly operate a remote workforce utilizing cloud based services. Although we maintain a physical office space, we don’t operate a local network and wireless access is provided to the Internet. Our wireless access points utilize WPA2 wireless authentication. Zero Trust We have built out a zero-trust architecture and utilize zero-trust solutions for access to our application. Back to top Risk Management Data Access/Impact Levels We classify impact levels based on data classification levels of the data involved in the incident. Risk Assessments We maintain continuous risk management utilizing a baseline risk assessment and performing risk assessments on an ongoing basis. Risks are reported to the Risk, Quality, and Oversight committee on at least a quarterly basis. Supply Chain Risk Management All third-parties are reviewed and approved according to pre-defined criteria to include business justification, security, privacy, quality, AI, and other requirements based on the criticality of the third-party. Vendor risks are managed according to our risk management processes. Third-Party Dependence All third-parties are reviewed and approved according to pre-defined criteria to include business justification, security, privacy, quality, AI, and other requirements based on the criticality of the third-party. Vendor risks are managed according to our risk management processes. Back to top Asset Management Asset Inventories (Hardware/Software) We utilize automated asset inventory solutions where possible. Where automated solutions aren’t possible, we maintain a written account of hardware and software assets. Asset Tracking We track assets (such as laptops) through automated solutions where possible. We leverage solutions provided by cloud service providers (such as AWS) to track assets. Automated Asset Detection We utilize automated asset detection provided by cloud service providers where available. Data Action Mapping We map data processed by assets and classify both the assets (and data) based on our classification methodology. IT Asset Management (ITAM) Program We maintain an IT Asset Management program through our mobile device management (MDM) solution provided by our human resource information system (HRIS). Secure Asset Disposal We securely dispose of assets according to our disposal policy and/or rely on third party providers (such as AWS) to dispose of their managed assets according to their service level agreements. Back to top Incident Response Designated Response Personnel We designate responsible personnel to handle incident response and maintain an incident response team. Forensic Retainer We retain forensic experts as necessary and maintain a forensic retainer with a vetted third party. Incident Reporting Process We maintain incident reporting procedures and responses as part of its incident response plans. Pager Service We maintain a solution to contact employees in an emergency situation or as needed pending certain events occurring. Back to top BC/DR Alternate Processing/Storage Site We rely on the high-availability and redundancy offered by AWS (and other cloud service providers). Business Continuity Management System (BCMS) We maintain business continuity management policies and procedures. We rely on the high-availability and redundancy offered by AWS (and other cloud service providers). Business Continuity Plan (BCP) We develop and maintain a business continuity plan according to several different standards. Contingency Plan Testing/Lessons Learned We perform annual contingency plan tests (i.e. tabletop exercises) and implement improvements identified in the after action reports. Contingency Training/Simulations We provide and conduct formal contingency training as well as perform annual tabletop exercises. Continuity/Contingency of Operations Plan We maintain continuity and contingency operations plans as part of our business continuity/disaster recovery plans. Critical Assets We identify critical assets prior to a disaster and address these critical assets through a business impact assessment as part of our business continuity/disaster recovery plans. Data Backup/Backup Protection We perform data backups according to our data backup schedules. Disaster Recovery Plan (DRP) We develop and maintain a disaster recovery plan, which is exercised at least annually according to standards. Failover/High Availability We rely on the high-availability and redundancy offered by AWS (and other cloud service providers). Tabletop Exercises We conduct annual tabletop exercises. Back to top Change Management Change Management Program We maintain a change management program to manage changes to systems. System changes must be approved prior to deploying into production environments. Change Restrictions All changes must be approved prior to deploying into production environments. Change Notification & Verification Notifications are made to stakeholders as necessary for changes being implemented into production. Configuration Management Program Configuration management processes are implemented to ensure any configuration changes are approved and changes do not impact production environments. Enforcement & Integrity We utilize QA processes as well as automated tools to scan program releases in order to ensure integrity of code. Impact Analysis We perform impact analysis on material changes to our environment including system impact, data impact, privacy impact, and AI impact assessments. Least Functionality We abide by the principle of least privilege and least functionality where applicable. Separation of Duties We maintain separation of duties between implementers, reviewers/approvers, and auditors. Software Restrictions We maintain a list of approved and unapproved applications and restrict installation to only approved software. System Hardening & Secure Baseline We leverage system hardened images according to standards. Back to top Training Employee Privacy Training We require employees to complete privacy training within sixty (60) days of hire and annually thereafter. Phishing Training We perform phishing training as part of security awareness training along with performing routine phishing campaigns. Role-based Training We provide role-based training to appropriate personnel. Secure Development Training We provide secure development and coding training primarily related to the OWASP top 10. Security Awareness Training We require employees to complete security training within sixty (60) days of hire and annually thereafter. Social Engineering Training We provide social engineering training as part of our security awareness training. Training Program We maintain a training program to include security, privacy, quality, AI, trade/sanction, secure coding, third party risk management, incident response, and other role-based training topics. Training Records We maintain records of training for all personnel within its learning management solution (LMS). Back to top Physical and Environmental Access Monitoring We are a cloud and remote first company; however, we permit only authorized individuals within leased office spaces. Access is maintained and monitored. We do NOT manage any data centers or maintain any data of customers within leased office spaces. Alarms & Surveillance We are a cloud and remote first company; however, we rely on alarms and surveillance provided by management of space we lease. We do NOT manage any data centers or maintain any data of customers within leased office spaces. Alternate Work Sites We are a cloud and remote first company. Our employees can work wherever access to the Internet is provided. We do NOT manage any data centers or maintain any data of customers within leased office spaces. Delivery & Loading Zones Any delivery and loading zones are secured and managed by the building management of the spaces we lease. Emergency Power & Lighting Emergency power and lighting is provided by the management of the spaces we lease. We do NOT manage any data centers or maintain any data of customers within leased office spaces. Facility Component Security We are a cloud and remote first company; however, we rely on facility component security provided by management of space we lease. We do NOT manage any data centers or maintain any data of customers within leased office spaces. Fire Protection Our leased facilities maintain fire protection according to local fire codes. We do NOT manage any data centers or maintain any data of customers within leased office spaces. Physical Access Security We are a cloud and remote first company; however, we permit only authorized individuals within leased office spaces. Physical access security is maintained and monitored. We do NOT manage any data centers or maintain any data of customers within leased office spaces. Power Equipment & Cabling We are a cloud and remote first company; however, we rely on power equipment and cabling provided by management of our leased space. We do NOT manage any data centers or maintain any data of customers within leased office spaces. Remote Telework We are a cloud and remote first company. We do NOT manage any data centers or maintain any data of customers within leased office spaces. Visitor Control We are a cloud and remote first company; however, we permit only authorized individuals within leased office spaces. Visitor control is maintained and monitored. We do NOT manage any data centers or maintain any data of customers within leased office spaces. Back to top Continuous Monitoring Automated Alert Response We maintain automated alert responses within our environment triggered according to certain criteria. Automated Compliance Monitoring We utilize our own Thoropass platform to assist in automated compliance monitoring. We also utilize tooling provided by cloud service offerings (such as AWS) and other SIEM/compliance tools. Data Loss Prevention System (DLP) (In Progress) We are researching data loss prevention (DLP) systems commensurate with our risk profile. Event & Audit Log Management Thoropass utilizes event and audit log management solutions within its environment. File Integrity Monitoring (FIM) We utilize file integrity monitoring (FIM) solutions within our environment. Intrusion Detection System (IDS) We leverage an Intrusion detection system (IDS) providing alerting capabilities on detected anomalies within our environment. Reviews & Updates We continuously review and update monitoring tools to ensure they are effective and up-to-date. Security Information & Event Management (SIEM) We implement a security information and event management solution (SIEM) within our cloud environment. Wireless Intrusion Detection System (WIDS) We are a cloud and remote first employer; however, we do provide our own wireless access points within our leased office space. Users must have credentials to access this wireless access network providing Internet access only. Our wireless system can identify and detect unauthorized devices. Back to top Security Grades Qualys SSL Labs Thoropass.com (A) https://www.ssllabs.com/ssltest/analyze.html?d=thoropass.com App.Thoropass.com (A+) https://www.ssllabs.com/ssltest/analyze.html?d=app.thoropass.com Security Headers Thoropass.com (A) https://securityheaders.com/?q=thoropass.com&hide=on&followRedirects=on App.Thoropass.com (A) https://securityheaders.com/?q=app.thoropass.com&hide=on&followRedirects=on