ISESG
1. Confidential Information
All non-public information, whether written, electronic, or oral, that relates to the company’s business, including but not limited to trade secrets, financial information, customer lists, vendor agreements, proprietary technology, and marketing strategies, is classified as confidential. Unauthorized disclosure or misuse of such information is strictly prohibited.
​
2. Data Encryption
All sensitive company data, including personal identifiable information (PII) and financial details, must be encrypted both in transit and at rest using industry-standard encryption protocols, such as AES-256. This ensures that even if the data is intercepted, it remains unreadable to unauthorized parties.
​
3. Access Control
Access to confidential company information should be restricted on a need-to-know basis. Only authorized personnel, who have undergone proper security training, should have access to sensitive data. Multi-factor authentication (MFA) should be enforced for all internal systems that store or process sensitive information.
​
4. Data Minimization
The company will only collect and retain the minimum amount of personal and sensitive data necessary for business operations. Unnecessary data should not be collected, and retention periods should be defined and enforced to ensure that data is not kept longer than needed.
​
5. Non-Disclosure Agreement (NDA)
All employees, contractors, and third-party vendors with access to sensitive company information must sign a Non-Disclosure Agreement (NDA), which legally binds them to confidentiality obligations regarding proprietary and confidential information.
​
6. Data Anonymization
When sharing data with third parties or using it for analysis purposes, all identifiable information should be anonymized or pseudonymized to protect the privacy of both the company and its stakeholders.
​
7. Third-Party Security
Any third-party vendors or service providers must comply with the company’s data protection standards. Vendor contracts should include clear data protection clauses that ensure compliance with relevant privacy laws and mandate secure handling of the company’s data.
​
8. Employee Training
All employees must undergo mandatory privacy and data security training to ensure they understand the importance ofprotecting sensitive company information. Regular training should be conducted to stay up to date with emerging threats and ensure adherence to the company's privacy policies.
​
9. Incident Response Plan
The company must have an incident response plan in place to address any data breaches or security incidents. This plan should include immediate steps for containment, investigation, and notification procedures for affected parties, in compliance with relevant laws and regulations.
​
10. Compliance with Privacy Laws
The company will comply with all applicable privacy laws and regulations, such as the General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA), and other regional or industry-specific regulations. Regular audits and assessments should be conducted to ensure ongoing compliance.
​
11. Data Subject Rights
If applicable, the company will respect the rights of individuals whose data is collected or processed, including the right to access, rectify, or delete personal information, as outlined by applicable privacy laws.
​
12. Secure Disposal of Data
When data is no longer necessary for business purposes and has reached the end of its retention period, it should be securely destroyed or deleted to prevent unauthorized access. This applies to both physical and digital data.