Organizational Security

Employee Background Checks #

ISMS Policy Generator is primarily operated by the founders, without additional employees. Therefore, traditional employee background checks are not applicable to our organization’s current structure. We rely extensively on third-party services, and we diligently assess the security controls applied by these third-party providers. For detailed information regarding the security measures implemented by our third-party partners, please refer to our section on third-party security.

Employee Security Training #

As ISMS Policy Generator is a founder-operated organization without additional employees, traditional employee security training processes are not applicable. However, the founders maintain a strong commitment to security and adhere to best practices in the industry. This includes staying informed and up-to-date on the latest security trends and methodologies to ensure that our product maintains the highest standards of security. The founder of this service holds the Certified Information Security Manager certification.

Employee Workstations Automatically Locked #

Yes, at ISMS Policy Generator, we follow best practices in workstation security. The workstations used by the founders are configured to automatically lock after a period of inactivity. This measure adds an essential layer of protection to prevent unauthorized access and aligns with our overall commitment to maintaining a secure environment for our users and our business operations.

Employee Workstations Encrypted #

Laptops are encrypted with BitLocker.

What are your feelings
Updated on 20 January 2024