Controlled Environment

Modified on Tue, 2 Jan, 2018 at 7:29 AM

Security Management

  • The company has established security policies to address the classification and protection of information, the encryption and security of company data on laptops and mobile devices, encryption protocols for data at rest and in motion, as well as to communicate the acceptable use of information and the system
  • The Leadership team has established roles within the organization to administer the company’s security policies and has appointed an Information Security Officer (ISO), currently the Partner, Customer Engagement
  • The ISO is responsible to the leadership team for administering the information security function. The ISO is the internal and external point of contact for all information security matters
  • All employees are required to sign and acknowledge their review of the company’s security policies

Personnel Management

  • All key employees that are responsible for developing and operating the Pellustro platform are extensively interviewed for skills prior to hiring
  • All employees are required to sign and acknowledge their review of the company’s security policies
  • All new hires are subject to pre-employment third party background checks
  • Pellustro platform uses role-based security controls to limit access to parts of the system and maintain separation of duties as well as isolation of customer data
  • Employees violating company’s security policies are subject to disciplinary action up to and including termination of employment
  • Employees are required to immediately report potential security incidents and potential vulnerabilities to the highest levels of the company


Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article