Last Updated: July 31, 2024
This Information Security Policy outlines the measures and practices Nodable AI Solutions implements to protect all information assets, including our own and those of our clients. It aims to ensure the confidentiality, integrity, and availability of information across all our operations and services.
This policy applies to all employees, contractors, systems, networks, and data involved in Nodable's operations and service delivery.
All information assets shall be classified according to their sensitivity and criticality:
3.1 Least Privilege Principle: Access rights will be granted based on the principle of least privilege.
3.2 Authentication: Multi-factor authentication is required for all system access.
3.3 Access Review: Regular reviews of access rights will be conducted to ensure appropriate access levels.
4.1 Encryption: All sensitive data must be encrypted both in transit and at rest.
4.2 Data Handling: Procedures for secure handling, storage, and transmission of data will be established and followed.
4.3 Data Retention: Data will be retained only as long as necessary for business purposes or as required by law.
5.1 Firewalls: Next-generation firewalls will be implemented and regularly updated.
5.2 Segmentation: Network segmentation will be used to isolate sensitive systems and data.
5.3 Monitoring: Continuous monitoring of network traffic for suspicious activities will be conducted.
6.1 Patching: All systems will be kept up-to-date with the latest security patches.
6.2 Hardening: Systems will be hardened according to industry best practices.
6.3 Antivirus: All systems will have up-to-date antivirus and anti-malware protection.
7.1 Secure Development: Secure coding practices will be followed in all software development.
7.2 Testing: Regular security testing, including penetration testing, will be conducted on all applications.
7.3 Third-party Applications: All third-party applications will undergo security assessment before implementation.
8.1 Access Controls: Physical access to data centers and offices will be restricted and monitored.
8.2 Environmental Controls: Appropriate environmental controls will be implemented to protect against physical threats.
9.1 Background Checks: All employees and contractors will undergo background checks.
9.2 Training: Regular security awareness training will be provided to all staff.
9.3 Acceptable Use: An Acceptable Use Policy will be maintained and enforced.
10.1 Response Plan: An Incident Response Plan will be maintained and regularly tested.
10.2 Reporting: All security incidents must be reported immediately to the Information Security team.
11.1 BC/DR Plan: A comprehensive Business Continuity and Disaster Recovery plan will be maintained and tested regularly.
12.1 Regulatory Compliance: Nodable will comply with all relevant data protection and privacy regulations (HIPAA, GDPR, CCPA, etc.).
12.2 Audits: Regular internal and external audits will be conducted to ensure compliance with this policy and relevant standards.
13.1 Assessment: All third-party vendors will undergo security assessment before engagement.
13.2 Contracts: Security requirements will be included in all vendor contracts.
This policy will be reviewed annually and updated as necessary to reflect changes in technology, business practices, and regulatory requirements.
Violations of this policy may result in disciplinary action, up to and including termination of employment or contract.
For questions or concerns about this policy, please contact the Information Security team at nodable@nodable.ai.
Last Updated: July 31, 2024