1. Objective The main objective of this policy is to ensure the protection, integrity and availability of confidential information and services that our SaaS company provides to our customers. We seek to prevent unauthorized access, misuse, disclosure, alteration and destruction of information.
2. Scope This policy applies to all employees, contractors, consultants and third parties who have access to company systems and networks. This includes anyone who processes, stores or transmits information on behalf of the company.
3. Responsibilities All employees are responsible for protecting the information to which they have access. Any violation of this policy may result in disciplinary action, up to and including termination.
Access Management Access to systems and data will be controlled on a "need to know" basis. Employees shall only have access to the information they need to perform their duties. All access will be logged and reviewed regularly by the security committee and/or internal auditor to detect any suspicious activity.
5. Data Protection All data stored on our systems will be encrypted at rest and in transit using strong encryption algorithms. Regular (weekly) backups will be performed and tested to ensure that they can be recovered in the event of data loss. In addition, we will implement measures to protect against malware and cyber attacks, including, but not limited to, the following:
Use licensed software and if it is SaaS, use software that complies with European or American security standards and regulations.
Keep the system and applications up to date: Updates often include security patches for newly discovered vulnerabilities.
When handling sensitive data, bmotik's virtual private network (VPN) should be used.
Keep the firewall enabled.
Be cautious with suspicious e-mails and links, avoiding cyber attacks that start with a phishing email or a malicious link. Only confirm in emails sent from the same organization and opt for a posture of constant suspicion and verification. In case of any doubt about an email, ask the security committee.
Perform regular data backups on a weekly basis in the case of customers and monthly in the case of bmotik internal data.
Implement two-factor authentication on all accounts related to bmotik, its customers and suppliers.
Train employees on cyber security, keeping employees informed about cyber security best practices, such as not sharing passwords or opening suspicious emails.
Monitoring the network regularly, maintaining early detection of suspicious activity can prevent a large-scale attack.
Maintain the incident response plan up to date.
5.1. Prohibition of Removable Media: As part of our commitment to robust data security, the use of removable media, including but not limited to USB drives, external hard drives and other portable storage devices, to manage customer data is strictly prohibited.
5.1.1. Alternative Safe Alternative Methods: To facilitate the secure management of customer data, Bmotik has established alternative methods for data transfer, storage and exchange. These approved methods adhere to industry best practices and encryption standards to ensure the confidentiality and integrity of customer information.
5.2. Prohibition of Sharing User Accounts: As part of Bmotik's commitment to maintaining sound information security practices, the organization strictly prohibits the sharing of user accounts among multiple individuals. Each user account is designated for individual use and is not transferable. Bmotik employees and authorized users are expressly prohibited from sharing their assigned user accounts with others. A user account is intended for the exclusive use of the individual to whom it is assigned and must not be shared, transferred or used by anyone else.
5.2.1. Individual Responsibility: Each user is individually responsible for activities performed using their assigned user account credentials. Sharing user accounts undermines established security and accountability measures and increases the risk of unauthorized access to sensitive information.
5.2.2. User Authentication: Users must authenticate using their unique credentials when accessing Bmotik systems, applications and resources. Sharing user accounts compromises the integrity of the authentication process and may result in unauthorized access. All accounts must use MFA.
5.2.3. Safety Implications: Sharing user accounts poses significant security risks, including, but not limited to, unauthorized access, data breaches, and the inability to accurately trace actions to specific individuals. It also violates the principle of least privilege by allowing individuals access beyond their authorized permissions.
5.2.4. Consequences of the Violation: Violations of this policy will result in disciplinary action, which may include written warnings, suspension of account privileges or termination of employment, depending on the severity and recurrence of the violation. In addition, in cases where the violation leads to unauthorized access or compromises sensitive information, legal action may be taken.
6. Incident Management Any security incident must be reported immediately to the security team or committee. An investigation will be conducted and steps will be taken to prevent future incidents. This may include changes to policies and procedures, additional training or improvements to security measures.
The standard information security incident response plan is described below:
7. Compliance The company will comply with all applicable laws and regulations related to information security and privacy. This includes the General Data Protection Regulation (GDPR), the Personal Data Protection Act (LPPD) and other relevant local and international laws.
8. Review and Update This policy will be reviewed and updated regularly, at least once a year or when significant changes occur in our business or in applicable laws and regulations.
9. Training All employees will receive regular information security training to ensure that they understand their responsibilities. This training will cover topics such as secure information handling, how to detect and report security incidents, and how to keep systems and data secure.
10. Security Committee A Security Committee will be formed comprised of key business representatives, including but not limited to IT, Legal, Operations and Finance. This committee will be responsible for the development, implementation and periodic, minimum annual oversight of the security program.
Communication with the safety committee shall be made through the following e-mail address: [email protected] or through the official communication channels enabled by the company.
11. Internal Audit Regular internal audits will be conducted to ensure compliance with this policy and to identify any areas requiring improvement.
Last modified February 5, 2024
Tips, news and more
List of equipment recommended by bmotik (sale and rental) for events, immersive experiences, etc.
Do you know someone who organizes events or who could benefit from Bmotik's platforms? Refer them to us and win amazing incentives!
Consult our API to integrate your own digital assets with our registration and logistics App.
Learn more about the EventTech industry and the cutting-edge technologies that are increasingly in demand at events of all kinds.