Information Security Policy
Last Updated: April 2026
1. Purpose and Scope
This Information Security Policy establishes the requirements and standards for protecting the confidentiality, integrity, and availability of Digitals AI and ML Platforms' information assets and customer data.
2. Access Control
All access to systems and data is controlled through:
- Role-based access control (RBAC) with least privilege principle
- Multi-factor authentication (MFA) for administrative and sensitive access
- Regular access reviews and revocation of unnecessary permissions
- Strong password requirements and periodic rotation
- Logging and monitoring of all administrative activities
3. Data Protection
All sensitive data is protected through:
- Encryption in transit (TLS 1.2+) for all data transfers
- Encryption at rest (AES-256) for sensitive information
- Data classification and handling procedures
- Secure deletion procedures when data is no longer needed
- Database access controls and query auditing
4. Network Security
Network security is maintained through:
- Firewall rules and network segmentation
- DDoS protection and rate limiting
- Web Application Firewall (WAF) for web applications
- Regular vulnerability scanning and penetration testing
- Intrusion detection and prevention systems
5. Application Security
Applications are developed and maintained with security in mind:
- Secure coding practices and code reviews
- Input validation and sanitization
- Protection against OWASP Top 10 vulnerabilities
- Regular security updates and patches
- Security testing during development and deployment
6. Incident Response
We maintain an incident response plan that includes:
- Detection and classification of security incidents
- Rapid containment and eradication procedures
- Notification of affected parties when required
- Post-incident analysis and lessons learned
- Regular incident response plan testing and updates
7. Audit Logging
Comprehensive audit logging is maintained for:
- User authentication and authorization events
- Administrative and privileged actions
- Data access and modifications
- System configuration changes
- Security events and anomalies
8. Change Management
All changes to systems and applications follow a formal change management process:
- Change requests and approvals
- Testing in non-production environments
- Change documentation and audit trails
- Rollback procedures when necessary
- Stakeholder communication and scheduling
9. Vendor Management
Third-party vendors and service providers are subject to:
- Security assessments before engagement
- Contractual security requirements
- Regular compliance monitoring
- Data handling and confidentiality agreements
- Periodic audits and reviews
10. Business Continuity
We maintain business continuity through:
- Documented disaster recovery procedures
- Regular backups of critical data
- Redundant systems and failover capabilities
- Periodic testing of recovery procedures
- Documented recovery time and recovery point objectives
11. Security Awareness and Training
All personnel receive regular security training covering:
- Security policies and procedures
- Phishing and social engineering awareness
- Password security and authentication
- Data protection and classification
- Incident reporting procedures
12. Policy Compliance
Compliance with this policy is mandatory for all employees, contractors, and third-party users. Violations will be investigated and may result in disciplinary action up to and including termination of employment or contract.
13. Policy Review
This policy is reviewed annually and updated as needed to address emerging threats, regulatory changes, and business requirements.
Contact Information
For questions regarding this security policy or to report security incidents, please contact:
Email: security@digitalsusa.com
Response Time: Critical incidents within 1 hour, non-critical within 24 hours