Laserfiche WebLink
Security Policies and Procedures <br />Low Access: Access to corporate email, sales, and marketing data only <br />Amazon Web Services (AWS) <br />Cloudant <br />Github <br />ELK Stack <br />Mixpanel <br />Kissmetrics <br />Salesforce <br />Access Rules <br />Limiting access to datasets and types <br />Limiting access to operating systems <br />Limiting times of access <br />Temporary Privileged Users and Accounts <br />D. Assignment and Revocation Procedure <br />An Employee Access Log for all new hires and/or workforce member change of <br />status. <br />An Exit Checklist for all terminations. <br />E. Logout After Inactivity <br />XIV. Breaches or Imaermissible Uses/Disclosures <br />Definitions <br />Penetrations of systems. aoDlications. networks or databases <br />Denial of service attacks <br />Misuse or mishandling of assets <br />Virus or other malware contamination <br />Transaction errors <br />Breaches of confidentiality agreements or contracts <br />Legal or regulatory violations <br />XV. Breach Response <br />A. Overview <br />Confidential Reporting: <br />Calling (may leave voice message) the ISO or AISO <br />Sending an email to the ISO or AISO, or: <br />XVI. Personnel Security <br />Screening for newly hired personnel, third parties, vendors <br />Professional qualifications <br />Identity checks <br />Criminal checks <br />Confirmation of academic and professional experience <br />B. Training and Awareness <br />Managing malicious software (e.g. viruses) <br />Using workstation(s) securely <br />Rev.2015.8.6 <br />