Here are the controls implemented at Near Platforms to ensure compliance, as a part of our security program.
Identify Validation
Termination of Employment
Inventory of Infrastructure Assets
Limit Network Connections
Transmission Confidentiality
Data used in Testing
Conspicuous Link To Privacy Notice
Approval of Changes
Malicious Code Protection (Anti-Malware)
Full Device or Container-based Encryption
Endpoint Security Validation
Endpoints Encryption
Code of Business Conduct
Organizational Structure
Roles & Responsibilities
Competency Screening
Personnel Screening
New Hire Policy Acknowledgement
Security & Privacy Awareness
Periodic Policy Acknowledgement
Automated Reporting
Incident Reporting Assistance
Assigned Cybersecurity & Privacy Responsibilities
Segregates Roles and Responsibilities
Retention of Policies
Chief Privacy Officer (CPO)
Asset Ownership Assignment
New Hire Security & Privacy Training Records
Periodic Security & Privacy Training Records
Inventory of Endpoint Assets