State of Flux has put in place a set of policies, procedures, technical and physical controls to protect the confidentiality, availability and integrity of information assets. These are applied to the entire organisation (or in some cases only a specific area where the information it seeks to protect is segmented). It not only includes technical controls but also controls to treat more common risks related to people, resources, assets and processes. If you would like more information on our security processes, please feel free to request a copy of our Compliance Handbook.
Articles in this section
- What access control, login tracking and general activity monitoring are in place for SupplierBase?
- What firewall structures are in place to protect SupplierBase data?
- Is SupplierBase subjected to regular third party penetration tests?
- How do you ensure the system has the most up to date patches?
- What backup process is conducted to prevent data loss?
- Is all data transit related to SupplierBase subject to encryption?
- What information security accreditations assure the delivery of SupplierBase?
- Does State of Flux carry out a robust risk assessment and management process?
- Does State of Flux have a strong, established security program and does its scope extend to all data processed for SupplierBase purposes?
- What service levels are in place for SupplierBase ticket resolution?