paul-co.secureframetrust.com
Open in
urlscan Pro
2606:4700:3034::6815:389e
Public Scan
URL:
https://paul-co.secureframetrust.com/
Submission: On August 08 via automatic, source certstream-suspicious — Scanned from DE
Submission: On August 08 via automatic, source certstream-suspicious — Scanned from DE
Form analysis
0 forms found in the DOMText Content
Paul Co | Trust Center * Resources * Monitoring * Compliance Trust Center Header Trust Center Subheader See section RESOURCES Request all documents TEST RESOURCE test Request TEST RESOURCE 2 Test 2 Request TEST RESOURCE 3 test 3 Request FAQS SUBPROCESSORS MONITORING Continuously monitored by Secureframe CHANGE MANAGEMENT * Change Management Policy AVAILABILITY ORGANIZATIONAL MANAGEMENT * Disciplinary Action * Information Security Program Review * Internal Control Monitoring View 1 more control CONFIDENTIALITY * Data Classification Policy VULNERABILITY MANAGEMENT INCIDENT RESPONSE RISK ASSESSMENT * Risk Register NETWORK SECURITY ACCESS SECURITY * Asset Inventory PHYSICAL SECURITY * Physical Security Safeguards * Physical Access Restrictions View all COMPLIANCE CYBER ESSENTIALS ISO 27018 Powered by MONITORING CHANGE MANAGEMENT Change Management Policy A Change Management Policy governs the documenting, tracking, testing, and approving of system, network, security, and infrastructure changes. ORGANIZATIONAL MANAGEMENT Disciplinary Action Personnel who violate information security policies are subject to disciplinary action and such disciplinary action is clearly documented in one or more policies. Information Security Program Review Management is responsible for the design, implementation, and management of the organization’s security policies and procedures. The policies and procedures are reviewed by management at least annually. Internal Control Monitoring A continuous monitoring solution monitors internal controls used in the achievement of service commitments and system requirements. Code of Conduct A Code of Conduct outlines ethical expectations, behavior standards, and ramifications of noncompliance. CONFIDENTIALITY Data Classification Policy A Data Classification Policy details the security and handling protocols for sensitive data. RISK ASSESSMENT Risk Register A risk register is maintained, which records the risk mitigation strategies for identified risks, and the development or modification of controls consistent with the risk mitigation strategy. ACCESS SECURITY Asset Inventory A list of system assets, components, and respective owners are maintained and reviewed at least annually PHYSICAL SECURITY Physical Security Safeguards Physical protections are in place to safeguard facilities, infrastructure, systems, and data from external and internal threats Physical Access Restrictions Processes are in place to create, modify or remove physical access to facilities such as data centers, office spaces, and work areas based on the needs of such individual. COMMUNICATIONS Privacy Policy A Privacy Policy to both external users and internal personnel. This policy details the company's privacy commitments.