Here are the controls implemented at Zealot to ensure compliance, as a part of our security program.
Identify Validation
Termination of Employment
Encrypting Data At Rest
Impact analysis
Transmission Confidentiality
Anomalous Behavior
Capacity & Performance Management
Centralized Collection of Security Event Logs
Conspicuous Link To Privacy Notice
Secure system modification
Malicious Code Protection (Anti-Malware)
Full Device or Container-based Encryption
Endpoint Security Validation
Session Lock
Endpoints Encryption
Code of Business Conduct
Organizational Structure
Roles & Responsibilities
Competency Screening
Personnel Screening
New Hire Policy Acknowledgement
Security & Privacy Awareness
Performance Review
Automated Reporting
Incident Reporting Assistance
Assigned Cybersecurity & Privacy Responsibilities
Periodic Review & Update of Cybersecurity & Privacy Program
Segregates Roles and Responsibilities
Data Protection Officer (DPO)
Testing
Chief Privacy Officer (CPO)
Asset Ownership Assignment
New Hire Security & Privacy Training Records
Inventory of Endpoint Assets