Information Security Program
Unleashd maintains an information security program focused on the security and integrity of Customer Data. Unleashd’s information security program includes administrative, technical, and operational controls appropriate for the size of its business and the types of information it processes.
Physical Protection
Unleashd maintains physical and environmental controls on its corporate office spaces, including restricted access to the facility. Entry to Unleashd’s buildings is secured via RFID security access card and alarms are enabled when the buildings are unoccupied.
Visitors are required to sign into a visitor log, and require supervision and a legitimate and specific business purpose to their visit.
Physical access to corporate offices or data processing centers is revoked upon employee separation, and is reviewed on a semi-annual basis.
Network Security and Encryption
Unleashd has implemented industry standard security controls to protect Customer Data from loss or unauthorized disclosure. Unleashd implements network boundary protection mechanisms to its production systems.
Data is encrypted in transit and at rest.
Personal data is transmitted via SFTP or API. Point to point VPN tunnels are set up between Unleashd’s offices and AWS Data Centres, with IP restrictions to limit access.
Unleashd’s AWS database instances use industry standard AES-256 encryption algorithm to encrypt the data. Each customer’s data set is partitioned within the database to ensure no cross contamination.
Monitoring
Unleashd monitors its systems by logging security-related events, alerting on suspicious activity, and conducting further analysis on suspicious activity.
Transmission Control
System logs audit and track the transmission of personal data for both internal parties as well as receiving or sending to external parties. User audit logging is used within the platform to identify usage and activity.
Access to systems that contain personal data is restricted to authorized personnel and within each platform restricted to the mechanism of delivery required for the specific service function.
Logical Access Control
Access to Customer Data is restricted based on the least privilege principle. Access is issued via a documented access authorization process, and revoked as soon as practicable on personnel separation. Requests for access are recorded in an internal tracking tool and an audit log of permissions is stored within the platform. Periodic and annual reviews of audit logs are conducted.
Users are required to set their password at first login and it is prohibited to share, store, or transmit passwords at any time.
There is a minimum requirement of 8 characters, and weak or previously used passwords are rejected. Multi-factor authentication is enabled on all user accounts, and passwords expire every 6 months.
Personnel Security
Unleashd ensures it hires skilled professionals who sign a confidentiality agreement, acceptable use of information systems agreement, and code of conduct. Annual training pertaining to data protection practices is mandatory for all employees, and personnel transfers result in access management changes based on least privilege and role.
Incident Management
Unleashd maintains an information security incident management program that provides timely response and notification as appropriate to security incidents in order to protect Customer Data.
Backup and recovery exists as part of Unleashd’s overall AWS Infrastructure along with multiple layers of redundancy. Backups are performed weekly at a minimum.
Anti-virus is maintained on workstations and servers, and scans are completed daily. Real-Time scanning is enabled on all systems for immediate threat protection, and all locations have firewalls with active subscriptions for up to date threat watch and management. Security patches and fixes for known system vulnerabilities are promptly implemented and updated.
Audit and Compliance
Unleashd periodically reviews the security controls put in place by its third party providers and sub-processors to ensure that they have implemented adequate security controls to protect Customer Data that may be stored or accessed by its third party providers.
Audits of internal processes are conducted annually.