Your one place for all documentation related to compliance, security and reliability of our products and services.
Download All
Acceptable Use PolicyThe wide array of resources, services, and interconnectivity available via the Internet all introduce risks. |
1.1 | 2019-07-02 | Download PDF |
Change Management PolicyDeploying changes, updates, and new software into production may, if not managed effectively, result in outages or other customer disruptions. |
1.1 | 2019-07-02 | Download PDF |
Corporate Security Executive StatementIdentifying and managing any developments that may threaten the resilience and continued survival of a corporation. |
1.1 | 2019-07-02 | Download PDF |
Data Classification and HandlingAccidental, unauthorized disclosure, theft, and dissemination are among the risks involved in handling sensitive information. |
1.1 | 2019-07-02 | Download PDF |
Disaster Recovery PlanDisaster Recovery Plan (DRP) for use in the event of a disaster affecting the data centers or other computing facilities of Castle. |
1.1 | 2019-07-02 | Download PDF |
Network and Access Control PolicyAccessing and utilizing electronic resources creates risks associated with the methodologies used for such access. |
1.1 | 2019-07-02 | Download PDF |
Security Administration ManualAdministration and operations of security tasks is a key element in managing data security at Castle. |
1.1 | 2019-07-02 | Download PDF |
Security Incident Response PlanSecurity incidents pose a risk to Castle’s business. Quick and effective handling of such incidents is an important factor in minimizing potential damage. |
1.1 | 2019-07-02 | Download PDF |
Security Incident Response TemplateThe following report is used to track a confirmed security incident. |
1.1 | 2019-07-02 | Download PDF |
Software Development Life Cycle (SDLC)Process for planning, creating, testing, and deploying an information system. |
1.1 | 2019-07-02 | Download PDF |
Vendor Risk ManagementProcess for ensuring that the use of service providers and IT suppliers does not create an unacceptable potential for business disruption. |
1.1 | 2019-07-02 | Download PDF |