Peoplelogic.ai is committed to ensuring that data provided to Peoplelogic through use of our Peoplelogic.ai service (“Customer Data”) is protected. To that end, we take the following measures with respect to the security of that data.
|Organization of Information Security||
Security Officer. Peoplelogic has appointed a security officer responsible for coordinating and monitoring the security rules and procedures.
Confidentiality Obligations. Peoplelogic personnel with access to Customer Data are subject to confidentiality obligations.
Routine Security Audits. Peoplelogic runs a third-party audit each year to ensure that security practices are up to industry standards.
|Personnel||Security Training. Peoplelogic informs its personnel about relevant security procedures and their respective roles. Peoplelogic also informs its personnel of possible sanctions if they breach the security rules and procedures.|
|Physical and Environmental Security||
Physical Access to Facilities. Peoplelogic limits access to facilities where information systems that process Customer Data are located to identified authorized individuals.
Protection from Disruptions. Peoplelogic uses a variety of industry standard systems to protect against loss of data due to power supply failure or line interference.Disposal. Peoplelogic uses industry standard processes to delete Customer Data when it is no longer needed.
|Communications and Operations Management||
Movement of Data.
Access Policy. Peoplelogic maintains a record of security privileges of individuals having access to Customer Data.
Integrity and Confidentiality
Network Design. Peoplelogic has controls to avoid individuals assuming access rights they have not been assigned to gain access to Customer Data they are not authorized to access.
|Business Continuity Management||
Peoplelogic maintains emergency and contingency plans for the facilities in which Peoplelogic information systems that process Customer Data are located.Peoplelogic’s redundant storage and its procedures for recovering data are designed to attempt to reconstruct Customer Data in its original or last-replicated state from before the time it was lost or destroyed.
Article is closed for comments.