Security Commitments
Security Program
We are committed to protecting our customers’ sensitive data and information through robust security measures, including regular security assessment and controls testing, to ensure the confidentiality, integrity, and availability of data.
Risk Management
We maintain a comprehensive risk management program to identify, assess, and mitigate security risks and threats to our systems and customer data. This includes regular risk assessments, vulnerability scanning, and proactive measures to address and mitigate security risks.
Legal Compliance
We operate in full compliance with all relevant laws, regulations, and industry standards pertaining to the security and privacy of customer data.
Access Control
We implement and enforce strict access control measures to ensure that only authorized individuals have access to our systems and customer data. This includes regular access reviews, the use of multi-factor authentication, and role-base access controls.
Password Management
We enforce secure password management practices to protect against unauthorized access and data breaches.
Physical Security
We prioritize the physical security of our facilities to protect against unauthorized access, theft, or other physical security threats. This includes the implementation of physical access controls and surveillance systems to safeguard our premises.
Network Security
We maintain a secure and resilient network infrastructure to protect against unauthorized access, data breaches, and other security threats. This includes robust firewall configurations, intrusion detection and prevention systems, network segmentation, and regular monitoring to ensure the integrity and confidentiality of our customers’ data as it traverses our network.
Vulnerability and Patch Management
We maintain a proactive vulnerability and patch management program to identify, assess, and remediate vulnerabilities in a timely manner. This commitment includes regular vulnerability scanning, patch management processes, and swift remediation practices.
Change Management
We adhere to strict change management processes to ensure that changes to our systems and application are implemented in a controlled and secure manner.
Administrative and Operations Management
We are committed to implementing strong administrative and operational controls to ensure the effective management of our information security program. This includes clear policies and procedures, regular security training and awareness programs, comprehensive incident response planning, and ongoing oversight to maintain the confidentiality, integrity, and availability of our customers’ data.
Monitoring and Logging
We implement robust monitoring and logging capabilities across our systems to track and analyze security events, detect anomalies, and facilitate timely incident response. This commitment includes continuous monitoring, log management, and the prompt investigation of security incidents.
Destruction and Disposal
We practice secure and responsible destruction and disposal of assets to prevent unauthorized access to sensitive information. This includes secure data deletion methods, physical destruction of media, and documented disposal processes to safeguard our customers’ data throughout its lifecycle.
Encryption
We implement strong encryption measures to protect sensitive data at rest and in transit.
Business Continuity
We maintain a business continuity and disaster recovery plan to ensure the continuity of our operations and the availability of our systems and services in the event of a disruption or disaster. This includes regular testing and updating our business continuity plan to minimize impact on our customers in the event of an unforeseen incident.
Incident Response
We are dedicated to maintaining a secure and resilient infrastructure to protect against unauthorized access, data breaches, and other security incidents. We promptly address any security incidents or suspected breaches to minimize impact on our customers.
Contact Us
If you have any questions about our security commitments or information practices, please feel free to contact us at security@applied.co.
Additionally at Applied Intuition, we take security seriously. If you believe you’ve discovered a security vulnerability in our systems, we encourage you to report it responsibly. Please contact us at security@applied.co with details of your findings. We appreciate your efforts to keep our platform and users safe.
