Product security
CONTROL | STATUS |
Control self-assessments conducted The company performs control self-assessments at least annually to gain assurance that controls are in place and operating effectively. Corrective actions are taken based on relevant findings. If the company has committed to an SLA for a finding, the corrective action is completed within that SLA. | ✅ |
Data transmission encrypted The company uses secure data transmission protocols to encrypt confidential and sensitive data when transmitted over public networks. | ✅ |
Vulnerability and system monitoring procedures established The company's formal policies outline the requirements for the following functions related to IT / Engineering:
| ✅ |
Last updated