paul-co.secureframetrust.com Open in urlscan Pro
2606:4700:3034::6815:389e  Public Scan

URL: https://paul-co.secureframetrust.com/
Submission: On August 08 via automatic, source certstream-suspicious — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Paul Co | Trust Center
 * Resources
 * Monitoring
 * Compliance


Trust Center Header
Trust Center Subheader
See section


RESOURCES

Request all documents


TEST RESOURCE

test

Request


TEST RESOURCE 2

Test 2

Request


TEST RESOURCE 3

test 3

Request


FAQS




SUBPROCESSORS




MONITORING

Continuously monitored by Secureframe


CHANGE MANAGEMENT

 * Change Management Policy


AVAILABILITY


ORGANIZATIONAL MANAGEMENT

 * Disciplinary Action
 * Information Security Program Review
 * Internal Control Monitoring

View 1 more control


CONFIDENTIALITY

 * Data Classification Policy


VULNERABILITY MANAGEMENT


INCIDENT RESPONSE


RISK ASSESSMENT

 * Risk Register


NETWORK SECURITY


ACCESS SECURITY

 * Asset Inventory


PHYSICAL SECURITY

 * Physical Security Safeguards
 * Physical Access Restrictions

View all


COMPLIANCE


CYBER ESSENTIALS






ISO 27018




Powered by


MONITORING




CHANGE MANAGEMENT

Change Management Policy
A Change Management Policy governs the documenting, tracking, testing, and
approving of system, network, security, and infrastructure changes.


ORGANIZATIONAL MANAGEMENT

Disciplinary Action
Personnel who violate information security policies are subject to disciplinary
action and such disciplinary action is clearly documented in one or more
policies.
Information Security Program Review
Management is responsible for the design, implementation, and management of the
organization’s security policies and procedures. The policies and procedures are
reviewed by management at least annually.
Internal Control Monitoring
A continuous monitoring solution monitors internal controls used in the
achievement of service commitments and system requirements.
Code of Conduct
A Code of Conduct outlines ethical expectations, behavior standards, and
ramifications of noncompliance.


CONFIDENTIALITY

Data Classification Policy
A Data Classification Policy details the security and handling protocols for
sensitive data.


RISK ASSESSMENT

Risk Register
A risk register is maintained, which records the risk mitigation strategies for
identified risks, and the development or modification of controls consistent
with the risk mitigation strategy.


ACCESS SECURITY

Asset Inventory
A list of system assets, components, and respective owners are maintained and
reviewed at least annually


PHYSICAL SECURITY

Physical Security Safeguards
Physical protections are in place to safeguard facilities, infrastructure,
systems, and data from external and internal threats
Physical Access Restrictions
Processes are in place to create, modify or remove physical access to facilities
such as data centers, office spaces, and work areas based on the needs of such
individual.


COMMUNICATIONS

Privacy Policy
A Privacy Policy to both external users and internal personnel. This policy
details the company's privacy commitments.