Here are the controls implemented at What's Next's Trust Center to ensure compliance, as a part of our security program.
Situational Awareness For Incidents
Centralized Management of Flaw Remediation Processes
Encrypting Data At Rest
Data Backups
Limit Network Connections
Transmission Confidentiality
Capacity & Performance Management
Centralized Collection of Security Event Logs
Conspicuous Link To Privacy Notice
Secure system modification
Approval of Changes
Malicious Code Protection (Anti-Malware)
Full Device or Container-based Encryption
Endpoint Security Validation
Code of Business Conduct
Organizational Structure
Roles & Responsibilities
Security & Privacy Awareness
Incident Reporting Assistance
Assigned Cybersecurity & Privacy Responsibilities
Segregates Roles and Responsibilities
Asset Ownership Assignment