Org Logo

Controls

Here are the controls implemented at Zealot to ensure compliance, as a part of our security program.

Data security (3)

Identify Validation

Termination of Employment

Encrypting Data At Rest

Network security (5)

Impact analysis

Transmission Confidentiality

Anomalous Behavior

Capacity & Performance Management

Centralized Collection of Security Event Logs

App security (2)

Conspicuous Link To Privacy Notice

Secure system modification

Endpoint security (5)

Malicious Code Protection (Anti-Malware)

Full Device or Container-based Encryption

Endpoint Security Validation

Session Lock

Endpoints Encryption

Corporate security (19)

Code of Business Conduct

Organizational Structure

Roles & Responsibilities

Competency Screening

Personnel Screening

New Hire Policy Acknowledgement

Security & Privacy Awareness

Performance Review

Automated Reporting

Incident Reporting Assistance

Assigned Cybersecurity & Privacy Responsibilities

Periodic Review & Update of Cybersecurity & Privacy Program

Segregates Roles and Responsibilities

Data Protection Officer (DPO)

Testing

Chief Privacy Officer (CPO)

Asset Ownership Assignment

New Hire Security & Privacy Training Records

Inventory of Endpoint Assets