1. Purpose #
The purpose of this document is to establish a structured approach to security and risk management, ensuring the confidentiality, integrity, and availability of customer data in compliance with the Data Privacy Act of 2012 and ISO 9001:2015 standards.
2. Scope #
This procedure applies to all employees, contractors, and third-party service providers who process, store, or transmit customer data within BOXME.
3. Responsibilities #
3.1 Management Responsibilities
- Ensure adherence to security policies and compliance with regulatory requirements.
- Allocate necessary resources for security measures.
- Conduct periodic risk assessments and audits.
3.2 Employee Responsibilities
- Follow security guidelines and report any incidents.
- Participate in regular security training.
3.3 IT Security Team Responsibilities
- Implement security controls and monitor threats.
- Ensure data protection measures are up-to-date.
- Respond to security incidents and breaches.
4. Security Controls #
4.1 Access Control
- Role-based access control (RBAC) for restricted access.
- Multi-factor authentication (MFA) for system logins.
- Periodic review and revocation of inactive accounts.
4.2 Data Protection
- Encryption of sensitive data at rest and in transit.
- Secure backup and disaster recovery plans. Refer to RTO & RPO
- Data retention policy aligned with legal requirements.
4.3 Physical Security
- We always use data centers that meet international security standards.
- Our data centers (AWS, GCP) comply with standards such as ISO 27001, PCI-DSS, and SOC 2.
- The security system includes strict access control, data encryption, and 24/7 monitoring to ensure customer information safety.
- Access to the data center is restricted.
- CCTV surveillance and biometric authentication are implemented for high-security areas.
- Security personnel are on duty 24/7.
5. Risk Management #
5.1 Risk Identification
- Conduct risk assessments semi-annually.
- Maintain a risk register to document potential threats.
5.2 Risk Mitigation
- Implement preventive measures to address identified risks.
- Regular penetration testing and security updates.
5.3 Incident Management
- Immediate containment and analysis of security incidents.
- Notification to affected stakeholders and regulatory authorities.
- Post-incident review and continuous improvement measures.
6. Compliance and Monitoring #
- Conduct periodic internal audits for compliance with ISO 9001:2015.
- Regular reporting to management on security metrics.
- Continuous improvement through feedback and industry best practices.
7. Training and Awareness #
- Mandatory cybersecurity training for all employees.
- Regular phishing simulations and security awareness campaigns.
- Policy adherence verification through internal assessments.
8. Document Control #
- This procedure is maintained by the IT Security Team.
- Reviewed annually and updated as necessary to align with new risks and regulations.
9. Contact Information #
For security concerns or incident reporting, please contact:
- Email: [Security Contact Email]
- Phone: [Security Contact Phone]
This procedure is effective as of 01.02.2024 and will be reviewed periodically for improvements.