Squid Alerts and Customer agree that this Squid Alerts Data Security Policy (“Data Security Policy”) is hereby incorporated into and made a part of the written agreement between them that references this policy (the “Agreement”). Any capitalized terms used but not defined herein shall have the meaning described in the Agreement. In the event of any conflict between the terms of the Agreement and this Data Security Policy, this Data Security Policy shall govern with respect to the security measures in place for Customer Personal Data. The term Customer Personal Data as used herein includes Contact Information.
The Service uses industry-accepted encryption methods and products to protect Customer Personal Data and communications during transmissions between a customer's network and the Service including encryption for data in transit over public networks and encryption for data at rest.
Encryption in Transit
All data transferred over public networks is encrypted via Secure Sockets Layer (SSL) and HTTPS/Transport Layer Security (TLS).
Encryption at Rest
Data at rest is encrypted using at least AES-256 or higher levels of encryption. Squid Alerts shall not make copies of Customer Personal Data save as reasonably necessary to provide the Service and for backup purposes.
Upon termination of the Service for which Squid Alerts is processing Customer Personal Data, Squid Alerts shall, upon Customer’s request and subject to the limitations described in the Agreement, delete Customer Personal Data in accordance with the procedures and timeframes specified in the Agreement.
Squid Alerts follow the “Principle of Least Privilege”, with the intent of reducing access and only allowing employees access to the tools, systems, and data they need to perform their job. Access to production systems are role-based, centralized, auditable, and regularly reviewed. Squid Alerts will take reasonable steps to ensure that no person shall be appointed by Squid Alerts to process Customer Personal Data unless that person:
(a) is competent and qualified to perform the specific tasks assigned by Squid Alerts;
(b) has been authorized by Squid Alerts; and
(c) has been instructed by Squid Alerts in the requirements relevant to the performance of the obligations of Squid Alerts, in particular the limited purpose of the data processing.
All Squid Alerts assets are tracked and managed within a central repository. All corporate laptops are full disk encrypted and wiped per industry standards when decommissioned. All infrastructure equipment housing Customer Personal Data resides within certified third-party data centers within AWS. AWS currently uses the techniques detailed in NIST 800-88 (“Guidelines for Media Sanitization”) as part of the decommissioning process.
Squid Alerts requires industry best practices around password requirements and storage. Furthermore, we require Single Sign On (“SSO”) with multi-factor authentication requirements internally, as well as an option to our customers who wish to use SSO.
All changes to Squid Alerts software follow Squid Alerts's change management process and require testing and approval prior to release to production.
Business Continuity and Disaster Recovery
Squid Alerts will ensure that the systems where Customer Personal Data is stored have a disaster recovery plan that addresses geographic availability, multiple site availability, and replication of critical systems and data. Squid Alerts will ensure that its third-party data center has adequate Disaster Recovery plans in place and that they are tested annually. All networking components, load balancers, web servers and application servers that are part of the Squid Alerts platform are configured in a redundant configuration. All Customer Personal Data is stored on a primary database server that is clustered with a backup database server for redundancy. All Customer Personal Data is automatically backed up every six hours. Squid Alerts performs regular recovery testing.
Incident Management and Breach Notification
Squid Alerts maintains security incident management policies and procedures. Squid Alerts will promptly notify Customer in the event Squid Alerts becomes aware of an actual or reasonably suspected unauthorized disclosure of Customer Personal Data.
Our approach to enterprise risk management at Squid Alerts has multiple layers, designed to focus on how we address risk as part of ongoing business operations throughout the year, not just as a point-in-time exercise on an annual basis. Squid Alerts maintains enterprise and cybersecurity risk assessment procedures, including annual risk assessments.
All new Squid Alerts employees and contractors attend security training during the on-boarding process. Additionally, all employees and contractors are required to take annual information security awareness training. Training is tracked and monitored for compliance.
Threat and Vulnerability Management
Squid Alerts uses several sources and tools for identifying, tracking, responding to, and remediating vulnerabilities. We subscribe to all relevant security mailing lists for our operating systems, datastores, load balancer, web frameworks, languages, as well as to industry and government mailing lists.
(a) Vulnerability Management and Penetration Testing
We perform regular and continuous scans of our systems to identify vulnerabilities. Squid Alerts performs annual penetration tests performed by a third-party. Reports are available under NDA upon Customer request.
(b) Patch Management
Patches and upgrades are automatically applied when a system is rebooted, or deployed fleet wide via our configuration management software. Patches are applied based on the severity level of the vulnerability according to our patch management guidelines.
Squid Alerts will implement, or be responsible for its Sub-processors’ implementation of, measures designed to:
(a) deny unauthorized person’s access to data-processing equipment used for processing Customer Personal Data (equipment access control);
(b) prevent the unauthorized reading, copying, modification or removal of data media containing Customer Personal Data (data media control);
(c) prevent unauthorized inspection, modification or deletion of stored Customer Personal Data (storage control);
(d) prevent the use of automated data-processing systems by unauthorized persons using data communication equipment used to process Customer Personal Data (user control);
(e) limit access to Customer Personal Data by persons authorized to use an automated data-processing system to the scope and duration of their access authorization (data access control);
(f) enable verification of the individuals to whom Customer Personal Data has been transmitted or made available using data communication equipment (communication control);
(g) enable verification of which individuals input Customer Personal Data into automated data-processing systems and when (input control);
(h) prevent the unauthorized reading, copying, modification or deletion of Customer Personal Data during transfers of that data or during transportation of data media (transport control);
(i) enable restoration of installed systems used to process Customer Personal Data in case of interruption (recovery);
(j) ensure that the functions of the system used to process Customer Personal Data perform, that the appearance of faults in the functions is reported (reliability) and prevent stored Customer Personal Data from corruption by means of a malfunctioning of the system (integrity).
Logging and Monitoring
Squid Alerts shall ensure that all Squid Alerts systems used to store Customer Personal Data, including firewalls, routers, network switches and operating systems, log information to their respective system log facility or a centralized syslog server (for network systems).
Squid Alerts, or an authorized third party, will monitor the Service for unauthorized intrusions using network-based and log-based intrusion detection mechanisms.
Squid Alerts’ third-party production data centers have an access system that controls access to the data center. This system permits only authorized personnel to have access to secure areas. The facility is designed to withstand adverse weather and other reasonably predictable natural conditions, is secured by around-the-clock guards, biometric access screening and escort-controlled access, and is also supported by on-site back-up generators in the event of a power failure.
Human Resource Security
(a) Employee Handbook
All Squid Alerts employees must read and agree to the company policies, including Code of Business Conduct and Ethics outlined in the Squid Alerts Employee Handbook.
(b) Acceptable Use Policy (AUP)
Our Acceptable Use Policy outlines requirements around:
- Hardware, Software, Mobile Device, e-mail, and Network Use;
- Social Media; and
- Data Classification, Handling, and Ownership
(c) Non-Disclosure Agreement (NDA)
All employees and contractors must sign a Non-Disclosure Agreement or similar obligations of confidentiality prior to employment (“NDA”). Third-party services must sign an NDA before use.