Product
POPULAR CHECKS
MOM education verification
Reference
Civil background
Employment history
Social media
Criminal record
Right to work
Adverse financial history
Identity
Instant employment
All background checks
How we compare?
KEY FEATURES
Continuous screening
Compliance
Verepass
Global services
API
Whistleblowing
POPULAR INTEGRATIONS
All integrations
Industries
KEY INDUSTRIES
Finance & Fintech
Energy
Professional Services
Tech & IT
Staffing & Outsourcing
Country-specific packages
UK
Singapore
Philippines
New Zealand
Australia
USA
Business-sized solutions
Growth
Enterprise
Resources
Blog
Knowledge and insights from the world of hiring and HR
Webinars
Discover our upcoming and on-demand webinars
Reports
Data-driven, investigative long reads from industry experts
Case studies
Discover the ways we help customers all over the world
HR glossary
Get to grips with all the HR terms, jargon and lingo you need to know
ROI calculator
Calculate the return on investment of background checks
Help centre
Knowledge and insights from the world of hiring and HR
Contact support
Chat, phone and email support available globally

Trust has become the most measurable and most fragile asset in hiring

Get your own copy!
PartnersPricing
LoginSpeak to an expert
LoginSpeak to an expert

Information security policy

‍1. Introduction & Purpose

This document summarises the Veremark Information Security Policy, which establishes the framework for protecting Veremark’s information assets, ensuring the confidentiality, integrity, and availability of data, and preventing unintended disclosure. All staff are required to adhere to these standards. This Information Security Policy may be updated or enhanced by Veremark; a most recent copy of the same may be obtained upon request.

2. Access Control & User Management

  • Access Provisioning: Access is granted based on the "principle of least privilege" and role-based needs.
  • Authentication: * Passwords: Minimum 15 characters, including mixed case, numbers, and special characters. Changed every 90 days.
  • Multi-Factor Authentication (MFA): Mandatory for all compatible systems, including email.
  • Revocation: Immediate revocation of access for leavers via a formal staff exit procedure.

3. Physical & Device Security

  • Physical Security: Strict access controls to physical locations; segregation of duties implemented to prevent unauthorized access.
  • Device Encryption: Full disk encryption is mandatory for all portable devices and computers.
  • Remote Work: Access to internal systems is secured via cryptographically secure VPNs with individual keys.

4. Network & System Security

  • Network Segregation: Internal and Guest Wi-Fi networks are strictly isolated.
  • Firewalls & Protection: All networked systems utilize approved firewalls. Mandatory anti-virus software is deployed with up-to-date definitions.
  • Vulnerability Management: * Monthly automated security scans.
    • Annual third-party penetration testing and software security audits.
  • Patching: Automated patch management via Qualys cloud agent; users responsible for timely updates.

5. Data Protection & Encryption

  • Data Classification: Data is categorised as Confidential (sensitive third-party/client data), Internal (staff only), or Public.
  • Encryption in Transit: All traffic encrypted using PKI certificates/keys (HTTPS, SSH).
  • Encryption at Rest: Confidential information is stored using cryptographically sound mechanisms aligning with ISO 27000 and SOC 2 standards.
  • Data Destruction: Secure eradication methods (e.g., Disk Crusher, Gdisk) used for end-of-life media.

6. Software Development & Change Management

  • Secure Development: All systems undergo a Security Architecture Review by the CTO prior to deployment.
  • OWASP Compliance: Systems are tested against the OWASP Top 10 prior to release.
  • Change Control: Strict change management procedures for application, infrastructure, and emergency fixes, requiring approval from the CTO and relevant leads (DevOps/Product).
  • Code Review: Rigorous internal review for all code, including third-party developments.

7. Compliance & Third-Party Management

  • PCI DSS: Veremark minimizes scope by not storing PCI data directly; however, any systems touching such data must be PCI compliant.
  • Supply Chain Security: No unapproved third-party libraries or services permitted.

8. Incident Response & Logging

  • Logging: Comprehensive audit logs retained for a minimum of 90 days, covering access, modifications, and suspicious activity.
  • Incident Response: A formal Incident Response Plan is in place covering identification, classification, escalation, and resolution of security events.

‍

Older Versions

Version 2.0
→
Version 1.0
→
follow us
Company
AboutPartnersCareersContact
Resources
BlogReports & whitepapersCase studiesWebinarsVideosGlobal servicesSubscribe
Service
Candidate supportVerify PassportHelp centerFAQs
Legal
Customer data protection policyGeneral information security policyTerms of serviceCode of conduct and ethics policyWebsite Privacy policyWebsite Cookie policy
ISO27001 certified
Copyright © 2024 Veremark. All rights reserved