1. SECURITY COMMITMENT
At Interactive Media Network SRL (Maximate), we understand that entrusting your customer database requires absolute confidence in our security practices. We implement enterprise-grade security measures to protect your most valuable business assets.
2. INFRASTRUCTURE SECURITY
Data Storage Security:
-
Location: Digital Ocean Germany (EU jurisdiction)
-
Encryption: AES-256 encryption for all data at rest
-
Transmission: TLS 1.3 encryption for all data in transit
-
Backup: Secure automated backups in same geographical region
-
Access: Role-based access controls with admin-only database access
Network Security:
-
Firewall: 24/7 monitoring and protection
-
Intrusion Detection: Advanced IDS systems for threat detection
-
Monitoring: Continuous security monitoring with automated alerts
-
Updates: Regular security patches and system updates
3. OPERATIONAL SECURITY
Access Management:
-
Authentication: Multi-factor authentication for all administrative access
-
Authorization: Principle of least privilege access controls
-
Logging: Comprehensive logging of all data access activities
-
Monitoring: Real-time monitoring of user activities and system access
Personnel Security:
-
Background Checks: Thorough screening of all personnel with data access
-
Training: Regular security awareness training for all staff
-
Confidentiality: Strict confidentiality agreements for all employees
-
Responsibilities: Clear definition of security roles and responsibilities
4. COMPLIANCE FRAMEWORK
Regulatory Compliance:
-
GDPR: Full compliance with European data protection regulations
-
Romanian Law: Adherence to national data protection requirements
-
Industry Standards: Implementation of recognized security frameworks
-
Documentation: Comprehensive compliance documentation and procedures
Data Protection Standards:
-
Privacy by Design: Security built into all systems and processes
-
Data Minimization: Collection of only necessary personal data
-
Purpose Limitation: Data used only for specified, legitimate purposes
-
Retention Limits: Automatic deletion after defined retention periods
5. INCIDENT RESPONSE
Detection and Response:
-
Monitoring: 24/7 security monitoring for incident detection
-
Response Team: Dedicated incident response team with clear procedures
-
Escalation: Defined escalation procedures for security incidents
-
Recovery: Comprehensive disaster recovery and business continuity plans
Notification Procedures:
-
Immediate Response: Access credential reset within 24 hours
-
Client Notification: Immediate notification to affected clients
-
Regulatory Reporting: ANSPDCP notification within 72 hours as required
-
Documentation: Complete incident documentation and reporting
6. TECHNICAL SAFEGUARDS
System Security:
-
Servers: Hardened server configurations with minimal attack surface
-
Updates: Regular security updates and vulnerability patching
-
Monitoring: Continuous system monitoring and log analysis
-
Backup: Secure backup systems with regular recovery testing
Application Security:
-
Development: Secure coding practices and regular security reviews
-
Testing: Regular penetration testing and vulnerability assessments
-
Validation: Input validation and sanitization for all user inputs
-
Session Management: Secure session handling and timeout controls
7. THIRD-PARTY SECURITY
Sub-processor Security:
-
Vetting: Thorough security assessment of all third-party providers
-
Contracts: Data processing agreements with all sub-processors
-
Monitoring: Regular monitoring of third-party security practices
-
Compliance: Verification of sub-processor compliance with security standards
ESP Partner Security:
-
Reputation: Work only with established, reputable email service providers
-
European Jurisdiction: All ESP partners operate under European data protection law
-
Agreements: Comprehensive data processing agreements with all partners
-
Monitoring: Regular assessment of partner security practices
8. CLIENT DATA PROTECTION
Data Sovereignty:
-
Ownership: Clients retain complete ownership of their data
-
Control: Clients maintain control over data processing and usage
-
Access: Clients can access their data at any time
-
Portability: Data available for export in standard formats
Data Lifecycle Management:
-
Collection: Secure collection with appropriate consent mechanisms
-
Processing: Processing only for specified, legitimate purposes
-
Storage: Secure storage with appropriate retention periods
-
Deletion: Secure deletion when no longer needed
9. AUDIT AND VERIFICATION
Security Auditing:
-
Internal Audits: Regular internal security assessments
-
External Reviews: Third-party security reviews and assessments
-
Penetration Testing: Regular penetration testing by certified professionals
-
Compliance Audits: Regular compliance audits and verification
Documentation:
-
Policies: Comprehensive security policies and procedures
-
Training Records: Documentation of security training and awareness
-
Incident Reports: Detailed incident reports and response documentation
-
Compliance Reports: Regular compliance reporting and verification
10. BUSINESS CONTINUITY
Disaster Recovery:
-
Backup Systems: Regular automated backups with geographical redundancy
-
Recovery Plans: Comprehensive disaster recovery procedures
-
Testing: Regular testing of backup and recovery systems
-
Communication: Clear communication plans for emergency situations
Service Continuity:
-
Redundancy: Redundant systems and failover capabilities
-
Monitoring: Continuous monitoring of system availability
-
Maintenance: Regular maintenance with minimal service disruption
-
Updates: Coordinated updates to minimize service impact
11. TRANSPARENCY AND COMMUNICATION
Security Reporting:
-
Regular Updates: Quarterly security reports for premium clients
-
Incident Communication: Immediate notification of security incidents
-
Policy Updates: Notification of security policy changes
-
Best Practices: Sharing of security best practices and recommendations
Client Communication:
-
Security Briefings: Regular security briefings for client teams
-
Training Support: Security awareness training for client personnel
-
Consultation: Security consultation and advisory services
-
Feedback: Regular feedback collection on security practices