Security Policies 

Symplicity has adopted the following Security Policies: 

 
Acceptable Use

Acceptable use policy is a document stipulating constraints and practices that a user must agree to for access to a corporate network and other Symplicity assets.  

Access Control 
 
Access Control Policy defines high-level requirements and guidelines on user account management, access enforcement and monitoring, separation of duties, and remote access.   
 
Backup and Restoration  
 
Symplicity actively manages risks associated with data loss by defining a sound backup regime for all the data services. 
 
 Bring Your Own Device (BYOD)
 
This policy is intended to protect the security and integrity of Symplicity’s data and technology infrastructure when employees are using their personal device(s) to connect to Symplicity 's corporate network. 
 
Business Continuity and Disaster Recovery 
 
Symplicity has a Business Continuity and Disaster Recovery Policy that ensures that we can quickly recover from natural and man-made disasters while continuing to support customers and other stakeholders. 
 
Change Management  
 
A formal change management policy governs changes to the applications and supporting infrastructure and aid in minimizing the impact that changes have on Symplicity processes and systems. 
 
 Clean Desk and Clear Screen  
 
A clear desk and clear screen policy will help ensure that all sensitive/confidential materials are removed from workspaces and locked away when the items are not in use, or an employee leaves their workstation. 
 
 Corporate Ethics  
 
Symplicity values ethics, trust and integrity throughout its business practices. 
 
 Customer Support and SLA 
 
Customers are important to Symplicity. Symplicity provides Customer Support and a Service Level Agreement (SLA) to support its customers. 
 
 Data Integrity 
 
Symplicity ensures that system processing is complete, valid, accurate, timely, and authorized to meet the entity’s objectives. 
 
 Data Retention and Disposal 
 
This policy is about Symplicity 's approach for data retention and secure disposal. 
 
 Disciplinary Policy 
 
Symplicity has implemented a disciplinary process in order to deal with instance(s) of indiscipline including (but not limited to) non-compliance to information security policies and procedures by users. 
 
 Incident Management 
 
It is critical to Symplicity that security incidents that threaten the security or confidentiality of information assets are properly identified, contained, investigated, and remediated. 
 
 Information Classification 
 
Information classification is the process of assigning value to information in order to organize it according to its risk of loss or harm from disclosure. 
 
 Information Security 
 
Symplicity’s high-level policy of the organization that is created to support and enforce portions of Symplicity’s Information Management Policy by specifying in more detail what information is to be protected from anticipated threats and how that protection is to be attained. 
 
Internal Audit 
 
Symplicity conducts Internal Audits on its existing policies and controls to ensure the best level of service to its customers. 
 
 Internal Privacy
 
Policy Demonstrate Symplicity 's commitment to safeguarding and appropriately handling our employees' and contractors' personal information. 
 
 IT Asset Management 
 
Symplicity closely manages IT systems and the data that they contain from purchase to disposal. 
 
 Key Management and Cryptography 
 
Symplicity utilizes the latest commercially accepted encryption protocols. 
 
 Logging and Monitoring
 
Symplicity monitors and logs components and activities to effectively assess information system controls, operations and general security. 
 
 Mobile Device Management 
 
This policy defines procedures and restrictions for connecting mobile devices to Symplicity 's corporate network. 
 
 Network Security 
 
Symplicity provides a protected, interconnected computing environment through the use of securely configured network devices to meet organizational missions, goals, and initiatives. 
 
 Personnel Security 
 
Symplicity members understand their roles and responsibilities around security and privacy. 
 
 Physical and Environmental Security 
 
Symplicity protects managed systems and personnel from unauthorized access and from natural and human-caused damage or destruction. 
 
 Privacy Policy
 
The use and disclosure of personal information that is collected from individuals online, through websites and applications 
 
 Remote Access 
 
Access to Symplicity resources from outside organization networks for business purposes is closely managed and protected.
 
 Risk Assessment 
 
Symplicity institutes regular risk assessments and uses industry best practices in remediation. 
 
 Risk Assessment and Risk Treatment Methodology 
 
Symplicity provides a foundation for an effective risk management program, containing both the definitions and the practical guidance necessary for assessing and mitigating risks identified. 
 
 Server Security 
 
Symplicity manages, configures, and protects our servers and hosts based on industry best practices. 
 
 Software Development Policy 
 
Symplicity designs and builds software with security and privacy as design principles. 
 
 Technology Equipment Handling and Disposal 
 
Symplicity appropriately disposes of equipment that contains sensitive information. 
 
 Vendor Management 
 
Symplicity actively manages risks around third-party vendors and their access to the organization's data. 
 
 Vulnerability and Penetration Testing Management 
 
Symplicity conducts scheduled application and network scanning and penetration tests. 
 
 Working from Home 
 
Working from Home Policy provides a framework for working from home where it is both practical and acceptable. 
 
 Workstation and Mobile Device 
 
Symplicity protects laptops and workstations and their contents using industry best practices.