All team members, referred to as the supplier in this document, agree to adhere to these guidelines as part of their employment or service contract. This policy sets the standards for maintaining the security and confidentiality of our data. By following these best practices and any additional guidelines provided, every team member ensures the protection of our data.


Team Member Locations

Use of secure networks

⚠️ Example: Always connect to a secure network or use a VPN when working remotely to ensure all data transmissions are encrypted.

Device security

Ensure all devices used for work are protected by:

⚠️ Example: Store a complex password (e.g., a combination of upper- and lowercase letters, numbers, and symbols) in your laptop's 1Password vault and enable automatic software updates for your antivirus program.

Data encryption

<aside> 📩 Since 2010, HTTPS has been the default when you sign into Gmail. This means that your email travels between Google's data centers and the computer you use to read it, and it's encrypted and secure.

</aside>

Access control

⚠️ Example: Set up user accounts with specific permissions so that only authorized personnel can access sensitive project files.