We Have Measures In Place to:
Ensure the confidentiality, integrity, and availability of all data that we create, receive, maintain, or transmit.
Identify and protect against reasonably anticipated threats to the security or integrity of our systems.
Protect against reasonably anticipated, interpermissible uses or disclosures.
Risk Analysis and Management:
We are constantly evaluating the likelihood and impact of potential risks to our data.
We implement appropriate security measures to address any risks identified.
We maintain continuous, reasonable, and appropriate security protections.
We implement security measures to reduce risks and vulnerabilities.
We restrict access to data and PII to appropriate persons and then only when absolutely needed.
We have periodic assessments of how well our security policies and procedures are meeting requirements.
We have access controls in place to only allow authorized persons access to PII.
We have audit controls in place to record and examine access and other activity in systems that hold PII.
We have policies, procedures, and backups in place to help ensure PII is not improperly altered or destroyed.
We have implemented technical security measures that guard against unauthorized access to data that is being transmitted over the Internet.
We have implemented technical security measures that guard against unauthorized access to data while at rest.