Making great experiences requires trust
Inai Technologies Co recognises that the confidentiality, integrity and availability of information and data created, maintained and hosted by us are vital to the success of the business and privacy of our partners.
As a service provider/product, we understand the importance in providing clear information about our security practices, tools, resources and responsibilities within Inai Technologies Co so that our customers can feel confident in choosing us as a trusted provider.
This Security Posture highlights high-level details about our steps to identify and mitigate risks, implement best practices, and continuously develop ways to improve.
Compliances
Our security measures exceed industry standards for data protection and security
Trusted by
- Acceptable usage policy
- Communications & Network Security Policy
- Business Continuity & Disaster Recovery Policy
- Data Retention Policy
- Access Control Procedure
- Encryption Policy
- Compliance Procedure
- Physical & Environmental Security Policy
- Incident Management Policy
- Code of Business Conduct Policy
- Compliance Policy
- Asset Management Procedure
- HR Security Policy
- Vendor Management Procedure
- Data Breach Notification Policy
- Vendor Management Policy
- Data Classification Policy
- Operation Security Policy
- HR Security Procedure
- Network Security Procedure
- Endpoint Security Policy
- Asset Management Policy
- Media Disposal Policy
- Operations Security Procedure
- Risk Assessment & Management Policy
- Personal Data Breach Notification Procedure
- Privacy By Design Policy
- Data Protection Policy
- Access Control Policy
- SDLC Procedure
- Information Security Policy
- Business Continuity Plan
- Incident Management Procedure
- Organization of Information Security Policy
- Physical and Environmental Security Procedure
- System Acquisition and Development Lifecycle Policy