Founded in 1989

|

Controls (26)

Here are the controls implemented at Endpoint Automation Solutions to ensure compliance, as a part of our security program.

Data security (2)

Multi-factor Authentication

Transfer of PII

App security (1)

Conspicuous Link To Privacy Notice

Endpoint security (3)

Malicious Code Protection (Anti-Malware)

Full Device or Container-based Encryption

Endpoint Security Validation

Corporate security (20)

Code of Business Conduct

Organizational Structure

Roles & Responsibilities

Competency Screening

Personnel Screening

Security & Privacy Awareness

Performance Review

Automated Reporting

Incident Reporting Assistance

Risk Framing

Risk Assessment

Fraud

Third-Party Criticality Assessments

Assigned Cybersecurity & Privacy Responsibilities

Subservice organization evaluation

Segregates Roles and Responsibilities

Subprocessor Requirements

Data Protection Impact Assessment (DPIA)

Chief Privacy Officer (CPO)

Asset Ownership Assignment