Calculum recognises that the confidentiality, integrity and availability of information and data created, maintained and hosted by us are vital to the success of the business and privacy of our partners.
As a service provider/product, we understand the importance in providing clear information about our security practices, tools, resources and responsibilities within Calculum so that our customers can feel confident in choosing us as a trusted provider.
This Security Posture highlights high-level details about our steps to identify and mitigate risks, implement best practices, and continuously develop ways to improve.
Here are the important security policies and documents which are a part of Calculum’s compliance program.
Data Retention Policy
Policy
Confidentiality Policy
Policy
Incident Management and Response Policy
Policy
Vendor Management Policy
Policy
Media Disposal Policy
Policy
Vulnerability Management Policy
Policy
Password Policy
Policy
Human Resource Security Policy
Policy
Data Backup Policy
Policy
Acceptable Usage Policy
Policy
Privacy Policy
Policy
Information Security Policy
Policy
Disaster Continuity Policy
Policy
Disaster Recovery Policy
Policy
Environmental, Social, and Governance Policy
Policy
Endpoint Security Policy
Policy
Change Management Policy
Policy
Access Control Policy
Policy
Code of Business Conduct Policy
Policy
Physical Security Policy
Policy
Data Classification Policy
Policy
Risk Assessment and Management Policy
Policy
System Description
Policy
Artificial Inteligence (AI) Security Policy
Policy
Business Continuity Policy
Policy
Remediation Policy
Policy
Client Data Deletion Procedure Policy
Policy
ADA Platform Emergency Procedure
Policy
Key Management Runbook
Policy
Encryption Policy
Policy
Endpoint Security Incident Response Runbook
Policy
Inclusivity and Diversity Policy
Policy
Wireless Security Policy
Policy