SlideShare a Scribd company logo
1 of 2
SECURITY POLICY
Bloomboard, Inc. will comply with the following security requirements for each customer
deployment.
1. Maintain an internal security process governing the protection of its own information
resources and the resources of others
under its control.
2. Ensure that all of BBIÕs employees and representatives are covered by a binding
nondisclosure agreement.
3. Ensure that only persons with an approved need to know are allowed to access information
belonging to the Client, ClientÕs
customer or customer proprietary information, including establishing and maintaining controls
that allow a person to access
only the specific customer information and information resources required to perform the work
specified in the Terms and
Conditions <app.bloomboard.com/tac.html> (ÒTermsÓ).
4. Secure and protect ClientÕs proprietary information, ClientÕs employee proprietary
information, and other Client information
resources from unauthorized or improper use, theft, accidental or unauthorized modification,
disclosure or destruction.
5. Assure the reliability and integrity of all Client information and information resources under its
control and of the
information processing activities performed with or for the Client.
6. Maintain the proprietary nature and if necessary, the proprietary marking of any Client, Client
employee, or ClientÕs
customer proprietary information.
7. Comply with agreed upon arrangements for the movement of information and data between a
Client and BBI and between
BBI and Users. This also includes either the return of proprietary information to the Client or the
complete destruction of
proprietary information by shredding or burning or if no other mutually agreed upon means is
specified.
8. Use secure web site technology at a level of at least 3-DES encryption or equivalent for
collection of user registration
information, including passwords.
9. Ensure computer storage devices, e.g., hard or floppy disks, magnetic tape, or optical disks,
containing Client, or ClientÕs
customer data are not disposed of or otherwise presented to others unless all Client and
ClientÕs customer proprietary data has
been completely obliterated. This includes media used to transmit data and to create backups.
10. Not use or transfer Client, or ClientÕs customer, information or data for any purpose not
authorized in the Terms between the
Parties.
11. Implement security changes, security patches and security upgrades in systems,
applications and software in a timely manner
and commensurate with the threat. However, security changes, security patches or security
upgrades shall be implemented
within ninety (90) days of their release unless the Client agrees to a delay in implementation
within forty-five (45) days of
their release.
12. Ensure that authentication mechanisms are complex and not easily overcome. There shall
be no known way to bypass the
authentication mechanism and obtain entry into the system.
13. Ensure that Internet and other public (including public switched telephone) network
connections are designed, implemented
and maintained so as to secure and protect information and data, and system operation during
the life of the Terms. This
includes, but is not limited to, non-repudiation, authentication, authorization, and monitoring
issues. The Parties agree that
no Internet or other public network connections shall be implemented unless agreed to in writing
by the Client prior to
implementation. Authentication for remote access, e.g., in-dial, ISDN, wireless or other public
switched network access for
maintenance or administrative purposes are to use individually identified and a secure access
key.
14. Report to Client, within one working day of discovery, any known or suspected unauthorized
access, use, misuse, disclosure,
destruction, theft, vandalism, modification, or transfer of Client, or ClientÕs customer,
proprietary information.

More Related Content

Viewers also liked

Viewers also liked (10)

“Get Stuff Done Faster: Why Engineers Should Work with the ‘Dark Side’ of Tech”
“Get Stuff Done Faster: Why Engineers Should Work with the ‘Dark Side’ of Tech”“Get Stuff Done Faster: Why Engineers Should Work with the ‘Dark Side’ of Tech”
“Get Stuff Done Faster: Why Engineers Should Work with the ‘Dark Side’ of Tech”
 
Optimizely at Gilt--November 2013 presentation
Optimizely at Gilt--November 2013 presentationOptimizely at Gilt--November 2013 presentation
Optimizely at Gilt--November 2013 presentation
 
Continuous Delivery at Netflix
Continuous Delivery at NetflixContinuous Delivery at Netflix
Continuous Delivery at Netflix
 
The Agile PMO (fall 2014 version)
The Agile PMO (fall 2014 version)The Agile PMO (fall 2014 version)
The Agile PMO (fall 2014 version)
 
Devops at Netflix (re:Invent)
Devops at Netflix (re:Invent)Devops at Netflix (re:Invent)
Devops at Netflix (re:Invent)
 
Handling Eventual Consistency in JVM Microservices with Event Sourcing (javao...
Handling Eventual Consistency in JVM Microservices with Event Sourcing (javao...Handling Eventual Consistency in JVM Microservices with Event Sourcing (javao...
Handling Eventual Consistency in JVM Microservices with Event Sourcing (javao...
 
Introduction to Node.js
Introduction to Node.jsIntroduction to Node.js
Introduction to Node.js
 
Node Foundation Membership Overview 20160907
Node Foundation Membership Overview 20160907Node Foundation Membership Overview 20160907
Node Foundation Membership Overview 20160907
 
Microservices Workshop All Topics Deck 2016
Microservices Workshop All Topics Deck 2016Microservices Workshop All Topics Deck 2016
Microservices Workshop All Topics Deck 2016
 
Introduction to Container Management on AWS
Introduction to Container Management on AWSIntroduction to Container Management on AWS
Introduction to Container Management on AWS
 

Similar to Security policy

Generic_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresGeneric_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_Procedures
Samuel Loomis
 
SectionxIS Security Policiesmmddyy-Effectivemmddyy-.docx
SectionxIS Security Policiesmmddyy-Effectivemmddyy-.docxSectionxIS Security Policiesmmddyy-Effectivemmddyy-.docx
SectionxIS Security Policiesmmddyy-Effectivemmddyy-.docx
kenjordan97598
 
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docxSample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
todd331
 
Acceptable Use Policy.docx
Acceptable Use Policy.docxAcceptable Use Policy.docx
Acceptable Use Policy.docx
SALU18
 
Keeping Client Data Safe (Final)
Keeping Client Data Safe (Final)Keeping Client Data Safe (Final)
Keeping Client Data Safe (Final)
AdvogadaZuretti
 

Similar to Security policy (20)

Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2
 
IT Network Security Policy
IT Network Security PolicyIT Network Security Policy
IT Network Security Policy
 
Generic_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresGeneric_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_Procedures
 
Mobile Device Policy Template
Mobile Device Policy Template Mobile Device Policy Template
Mobile Device Policy Template
 
Group 10 - PDPA II.pptx
Group 10 - PDPA II.pptxGroup 10 - PDPA II.pptx
Group 10 - PDPA II.pptx
 
FCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityFCC Guidelines on Cyber Security
FCC Guidelines on Cyber Security
 
SectionxIS Security Policiesmmddyy-Effectivemmddyy-.docx
SectionxIS Security Policiesmmddyy-Effectivemmddyy-.docxSectionxIS Security Policiesmmddyy-Effectivemmddyy-.docx
SectionxIS Security Policiesmmddyy-Effectivemmddyy-.docx
 
Security by Design for Law Firms
Security by Design for Law FirmsSecurity by Design for Law Firms
Security by Design for Law Firms
 
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docxSample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
 
Acceptable Use Policy.docx
Acceptable Use Policy.docxAcceptable Use Policy.docx
Acceptable Use Policy.docx
 
08 pdf show-239
08   pdf show-23908   pdf show-239
08 pdf show-239
 
Datasheet: Security
Datasheet: SecurityDatasheet: Security
Datasheet: Security
 
Nurturing User Trust_ Designing Privacy-Centric Websites in a Data-Driven Wor...
Nurturing User Trust_ Designing Privacy-Centric Websites in a Data-Driven Wor...Nurturing User Trust_ Designing Privacy-Centric Websites in a Data-Driven Wor...
Nurturing User Trust_ Designing Privacy-Centric Websites in a Data-Driven Wor...
 
Keeping Client Data Safe (Final)
Keeping Client Data Safe (Final)Keeping Client Data Safe (Final)
Keeping Client Data Safe (Final)
 
Ensuring Security and Confidentiality with Remote Developers
Ensuring Security and Confidentiality with Remote DevelopersEnsuring Security and Confidentiality with Remote Developers
Ensuring Security and Confidentiality with Remote Developers
 
Advisory April Showers 02.19.2009
Advisory April Showers 02.19.2009Advisory April Showers 02.19.2009
Advisory April Showers 02.19.2009
 
Security and privacy in cloud computing.pptx
Security and privacy in cloud computing.pptxSecurity and privacy in cloud computing.pptx
Security and privacy in cloud computing.pptx
 
Exemplo de política BYOD
Exemplo de política BYODExemplo de política BYOD
Exemplo de política BYOD
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secure
 

Recently uploaded

會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
中 央社
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
EADTU
 

Recently uploaded (20)

會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
An Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppAn Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge App
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 

Security policy

  • 1. SECURITY POLICY Bloomboard, Inc. will comply with the following security requirements for each customer deployment. 1. Maintain an internal security process governing the protection of its own information resources and the resources of others under its control. 2. Ensure that all of BBIÕs employees and representatives are covered by a binding nondisclosure agreement. 3. Ensure that only persons with an approved need to know are allowed to access information belonging to the Client, ClientÕs customer or customer proprietary information, including establishing and maintaining controls that allow a person to access only the specific customer information and information resources required to perform the work specified in the Terms and Conditions <app.bloomboard.com/tac.html> (ÒTermsÓ). 4. Secure and protect ClientÕs proprietary information, ClientÕs employee proprietary information, and other Client information resources from unauthorized or improper use, theft, accidental or unauthorized modification, disclosure or destruction. 5. Assure the reliability and integrity of all Client information and information resources under its control and of the information processing activities performed with or for the Client. 6. Maintain the proprietary nature and if necessary, the proprietary marking of any Client, Client employee, or ClientÕs customer proprietary information. 7. Comply with agreed upon arrangements for the movement of information and data between a Client and BBI and between BBI and Users. This also includes either the return of proprietary information to the Client or the complete destruction of proprietary information by shredding or burning or if no other mutually agreed upon means is specified. 8. Use secure web site technology at a level of at least 3-DES encryption or equivalent for collection of user registration information, including passwords. 9. Ensure computer storage devices, e.g., hard or floppy disks, magnetic tape, or optical disks, containing Client, or ClientÕs customer data are not disposed of or otherwise presented to others unless all Client and ClientÕs customer proprietary data has been completely obliterated. This includes media used to transmit data and to create backups.
  • 2. 10. Not use or transfer Client, or ClientÕs customer, information or data for any purpose not authorized in the Terms between the Parties. 11. Implement security changes, security patches and security upgrades in systems, applications and software in a timely manner and commensurate with the threat. However, security changes, security patches or security upgrades shall be implemented within ninety (90) days of their release unless the Client agrees to a delay in implementation within forty-five (45) days of their release. 12. Ensure that authentication mechanisms are complex and not easily overcome. There shall be no known way to bypass the authentication mechanism and obtain entry into the system. 13. Ensure that Internet and other public (including public switched telephone) network connections are designed, implemented and maintained so as to secure and protect information and data, and system operation during the life of the Terms. This includes, but is not limited to, non-repudiation, authentication, authorization, and monitoring issues. The Parties agree that no Internet or other public network connections shall be implemented unless agreed to in writing by the Client prior to implementation. Authentication for remote access, e.g., in-dial, ISDN, wireless or other public switched network access for maintenance or administrative purposes are to use individually identified and a secure access key. 14. Report to Client, within one working day of discovery, any known or suspected unauthorized access, use, misuse, disclosure, destruction, theft, vandalism, modification, or transfer of Client, or ClientÕs customer, proprietary information.