- Background checks on new team members: We conduct background checks on our new team members.
- Information Security training: We require our employees to complete information security training and other training on policies in place.
- Access to Information Security policies in place: We provide a platform where our customers, contractors, and team members can easily access our policies when they need them.
- Whistleblower Policy Implementation: We implement a formalized whistleblower policy. This is an anonymous communication channel is available for users to report potential issues or fraud concerns.
- Confidentiality Agreement acknowledged by contractors: We require our contractors to sign a confidentiality agreement before we start working with them.
- Confidentiality Agreement acknowledged by team members: We require our team members to sign a confidentiality agreement upon hiring.
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article