Security And Policies
- Home
- Security And Policies
1. Purpose:
2. Scope:
This policy applies to all personnel, including employees, independent contractors, and third-party service providers, who require remote access to Bravas Technology’s systems and services. It covers:
- Cloud-based platforms (e.g., Google Workspace, HubSpot, SafetyCulture, Employment Hero, Trello, QuickBooks).
- Company-owned devices and approved personal devices used to access company systems remotely.
- Client workspaces accessed on behalf of Bravas Technology’s services.
3. Remote Access Guidelines:
Secure Network Usage :
- Remote access should only be conducted over secure and trusted networks.
- Public or unsecured Wi-Fi networks must be avoided; if necessary, users must enable a Virtual Private Network (VPN) to establish a secure connection.
Multi-Factor Authentication (MFA) :
- MFA must be enabled and used for accessing all company systems, including Google Workspace, HubSpot, SafetyCulture, Employment Hero, Trello, and QuickBooks.
- Users must configure MFA using company-approved authentication methods (e.g., authenticator apps, security keys).
- Devices used for remote access must have up-to-date security patches, firewalls, and antivirus software installed.
- Lost or compromised devices must be reported immediately to the Director, Darcy Patterson for investigation and necessary action.
4. Responsibilities:
User Responsibilities:
- Ensure MFA is configured and actively used for all required platforms.
- Connect only through approved secure networks and avoid public Wi-Fi unless using a VPN.
- Maintain strong, unique passwords and adhere to company Access Control & Passwords Policy.
- Report any suspicious activity or unauthorized access attempts immediately to the Director.
Bravas Technology Responsibilities:
- Conduct regular security audits to ensure compliance with remote access protocols.
- Enforce access reviews to verify that only authorized personnel have remote access privileges.
- Provide training and guidance on secure remote access practices to employees and contractors.
- Monitor login activity and investigate unusual access patterns.
5. Monitoring & Compliance:
Bravas Technology continuously monitors its remote access security through:
- System access logs to track login attempts and detect anomalies.
- Automated security alerts for unauthorized access attempts.
- Quarterly compliance audits to assess adherence to MFA and remote access security requirements.
Failure to comply with this policy may result in:
- Suspension or revocation of remote access privileges.
- Termination of contract or employment for repeated non-compliance.
- Legal action, if unauthorized access results in data breaches or security incidents.
6. Policy Review & Updates:
This policy will be reviewed annually or updated as required to align with new cybersecurity threats and industry best practices. Any changes will be communicated to all personnel, and compliance training will be conducted as needed.
Acknowledgment & Agreement
By accessing Bravas Technology’s systems remotely, all personnel confirm they have read, understood, and agree to comply with this policy. Failure to adhere to this policy may result in restricted access or disciplinary action.
1. Purpose:
2. Scope:
This policy applies to all employees, independent contractors, and third parties with access to Bravas Technology’s systems, data, and business applications. It encompasses:
- Cybersecurity incidents, including data breaches, phishing attacks, malware infections, and unauthorized access.
- System compromises, such as account hijacking, credential leaks, or misconfigurations.
- Operational disruptions caused by cybersecurity threats or system failures.
3. Incident Reporting & Response:
To ensure a swift and coordinated response to security incidents, the following steps must be followed:
Incident Identification & Reporting:
- Any suspected or confirmed security incident must be reported immediately to the client’s designated security contact via email and phone.
- The incident must also be escalated to the Director, Darcy Patterson, who will oversee the response efforts.
- Incident reports must include the following details:
Nature of the breach (e.g., unauthorized access, phishing attempt, data exposure).
Systems affected (e.g., Google Workspace, HubSpot, SafetyCulture).
Initial response actions taken (e.g., password resets, access revocation).
Containment & Mitigation :
Upon receiving an incident report, the following containment measures should be implemented:
- Account Security: Reset compromised credentials and enforce Multi-Factor Authentication (MFA) if not already enabled.
- System Isolation: Restrict access to affected systems to prevent further exploitation.
- Network Security: If necessary, block malicious IP addresses and monitor traffic for suspicious activity.
- Data Protection: Ensure any exposed data is secured, and investigate the extent of unauthorized access.
Communication & Escalation :
- Bravas Technology will coordinate with the affected client and third-party security teams (e.g., SafetyCulture security team) for a collaborative response.
- If required by law or contract, affected parties will be notified promptly in accordance with Australian Privacy Act 1988 and GDPR guidelines.
- Internal stakeholders will be kept informed of the investigation’s progress and any necessary remediation steps.
Recovery & Post-Incident Actions :
Once the immediate threat is neutralized, Bravas Technology will:
- Follow third-party software recovery procedures (e.g., SafetyCulture’s security protocols) to restore affected systems.
- Conduct a root cause analysis to identify vulnerabilities and recommend long-term security improvements.
- Implement corrective actions, such as security updates, employee training, or policy adjustments to prevent recurrence.
4. Responsibilities:
Director Responsibilities:
- Act as the primary escalation point and coordinate incident response efforts.
- Ensure timely communication with clients and external security teams.
- Approve necessary remediation and security enhancement measures.
Contractor & Employee Responsibilities:
Promptly report all security incidents and cooperate fully in investigations.
- Adhere to security best practices and participate in periodic security awareness training.
- Implement recommended security measures, such as using strong passwords and avoiding suspicious links or attachments.
5. Monitoring & Compliance:
- Bravas Technology will conduct periodic security audits to assess vulnerabilities and refine incident response procedures.
- Security logs and incident reports will be reviewed to ensure compliance with established policies.
- Failure to report or respond to security incidents appropriately may result in disciplinary action, termination of contracts, or legal consequences.
6. Policy Review & Updates:
Acknowledgment & Agreement
By accessing Bravas Technology’s systems, all users confirm they have read, understood, and agree to comply with this policy. Failure to adhere to this policy may result in restricted access or disciplinary action.
1. Purpose:
2. Scope:
This policy applies to all:
- Company hardware (e.g., Apple MacBooks, external storage devices, and networking equipment).
- Software platforms (e.g., Google Workspace, Google Cloud, HubSpot, and other business-critical applications).
- Independent contractors and employees who have access to Bravas Technology’s systems and data.
- Third-party vendors providing services that involve access to company data or systems.
3. Cybersecurity Measures:
- Device Security: All company and contractor devices must undergo regular antivirus scans and automatic security updates to mitigate vulnerabilities.
Access Control:
- Multi-Factor Authentication (MFA) is mandatory for accessing cloud-based services and sensitive systems.
- Role-based access control (RBAC) ensures that users only have permissions necessary for their job functions.
- Contractors and employees are required to use strong, unique passwords managed via a password manager.
Network Security:
- Company systems must be accessed only through secure networks. Public Wi-Fi must not be used without a VPN.
- Firewalls and encryption protocols must be enabled on all company devices.
Data Protection:
- Sensitive client and company data must be stored and transmitted using encrypted channels.
- Data access must be logged and regularly audited for unauthorized access attempts.
Incident Response:
- Any suspected or confirmed cybersecurity incidents must be reported immediately to the Director.
- Incident response procedures must be followed as outlined in the Incident Response Policy.
Compliance:
- All systems must be configured according to security recommendations provided by Google Cloud security guidelines and other relevant service providers.
4. Training & Awareness:
To ensure ongoing cybersecurity awareness and compliance, Bravas Technology requires:
- Onboarding Training: All contractors and employees must complete cybersecurity training, covering topics such as:
○ Phishing awareness and email security
○ Secure password management
○ Safe data handling and device security - Periodic Refresher Training: Security training is required annually, with additional training scheduled as needed based on emerging threats or incidents.
- Security Drills: Employees and contractors may be subject to simulated phishing exercises to assess their awareness and responsiveness to security threats.
5. Monitoring & Compliance:
Bravas Technology continuously monitors its remote access security through:
- Regular system audits to detect vulnerabilities and enforce policy compliance.
- Automated security alerts for suspicious activity or unauthorized access attempts.
- Contractor security compliance checks to verify adherence to cybersecurity protocols.
Failure to comply with this policy may result in:
- Suspension or termination of access to company systems.
- Contract termination for independent contractors or vendors who do not meet security standards.
- Legal action, where applicable, in cases of negligence leading to data breaches.
6. Policy Review & Updates:
Acknowledgment & Agreement
By accessing Bravas Technology’s systems and data, all users confirm they have read, understood, and agree to comply with this policy. Failure to adhere to this policy may result in disciplinary action or contract termination.
1. Purpose:
2. Scope:
This policy applies to all employees, independent contractors, and third parties who access Bravas Technology’s systems, including:
- Google Workspace
- HubSpot
- Third-party business applications (e.g., SafetyCulture, Employment Hero, QuickBooks, Trello)
- Company-owned or approved devices and network resources
Compliance with this policy is mandatory for all users to ensure data security and operational integrity.
3. Access Control Policy:
To maintain strict control over access to company data, the following guidelines must be followed:
- Role-Based Access Control (RBAC): Access to systems and data is granted based on job function and necessity.
- Least Privilege Principle: Users should be granted the minimum level of access necessary to perform their job duties.
- Multi-Factor Authentication (MFA): Required for all systems handling sensitive data to add an extra layer of security.
- Admin Access:
○ Only the director, Darcy Patterson, has administrative privileges to customer data systems.
○ No unauthorized modifications to admin permissions are permitted without documented approval.
4. Password Security Requirements:
-
- Passwords must comply with the complexity requirements set forth by Google
Workspace and other relevant platforms, which include:
- A minimum of 12 characters
- A mix of uppercase and lowercase letters, numbers, and special characters
- No reuse of the previous five passwords
- Passwords must comply with the complexity requirements set forth by Google
Workspace and other relevant platforms, which include:
- Passwords must be updated every 90 days and should never be shared with any individual.
- Users must use a password manager to securely store and manage credentials rather than writing passwords down.
- Bravas Technology will conduct regular password audits to ensure compliance and identify potential vulnerabilities.
5. Responsibilities
- Implement and maintain strict access control measures to protect sensitive data.
- Conduct regular security reviews and audits of system access logs.
- Ensure all employees and contractors receive training on password security and access control best practices.
- Do not share login credentials with anyone, including colleagues or external parties.
- Use unique passwords for each system and enable MFA where required.
- Report any suspected unauthorized access or security incidents immediately to the Director.
- Log out of systems when not in use, especially when working on shared or public devices.
6. Monitoring & Compliance:
Bravas Technology reserves the right to monitor system access and password compliance
through:
- Routine access reviews to validate appropriate privilege levels.
- Security audits to detect potential breaches or non-compliant behavior.
- Automated alerts for unauthorized login attempts or unusual activity.
7. Policy Review & Updates
Acknowledgment & Agreement
1. Purpose:
2. Scope:
- Client and partner data, whether personally identifiable or business-related;
- Data stored on company-owned hardware, Google Cloud, and HubSpot;
- Data transmitted to third-party platforms such as SafetyCulture and Employment Hero;
- Any other electronic or physical storage methods used by Bravas Technology to process and manage information.
3. Data Handling & Storage
- Data Collection: Only necessary data required for business operations and client services will be collected. Data will be collected transparently, with consent where required.
- Data Storage:
- Client data is temporarily stored in Google Workspace while being processed or transferred to client-approved third-party platforms (e.g., SafetyCulture, Employment Hero).
- Once data is successfully uploaded to the client’s designated system, it is removed from Bravas Technology’s internal storage.
- Data stored in HubSpot and other CRM platforms is protected by multi-factor authentication (MFA) and is strictly accessible only by authorized personnel.
- Data Encryption & Security:
- Data in transit and at rest is encrypted using industry-standard encryption protocols.
- Secure access controls, including role-based permissions and audit logs, are implemented to track data access and prevent unauthorized modifications.
4.Legal & Regulatory Compliance
- The Privacy Act 1988 (Cth) and the Australian Privacy Principles (APPs);
- The General Data Protection Regulation (GDPR) where applicable to EU-based clients;
- Any other relevant industry standards and contractual obligations related to data protection.
-
- Non-Disclosure Agreements (NDAs) are executed with clients, contractors, and relevant third parties handling sensitive data.
- Data subjects have the right to access, correct, or request deletion of their personal data, in accordance with legal requirements.
- In the event of cross-border data transfers, Bravas Technology ensures that appropriate safeguards, such as Standard Contractual Clauses (SCCs), are in place.
5. Responsibilities
Bravas Technology Responsibilities
- All personnel handling sensitive data are adequately trained in data privacy best practices.
- Data protection measures are periodically reviewed and updated in response to emerging risks.
- Incident response procedures are followed in the event of a data breach or suspected data security incident.
- Data Handling Training: All employees and contractors must undergo mandatory onboarding training on data privacy and security.
- Access Controls: Employees and contractors are only permitted to access data necessary for their role, and they must adhere to Bravas Technology’s security guidelines.
- Reporting Obligations: Any suspected or actual data breach must be reported immediately to the Director and handled in accordance with the Incident Response Policy.
6. Data Breach Management
- Detection & Assessment
- Identify and classify the security incident (e.g., unauthorized access, data breach, malware attack).
- Assess the impact on systems, client data, and operations.
- Activate the Incident Response Team (IRT) as needed.
- Containment & Mitigation
- Isolate affected systems, revoke compromised access, and enforce immediate MFA revalidation.
- Conduct forensic analysis to determine the root cause.
- Remove threats, scan for vulnerabilities, and ensure no further compromise.
- Client & Regulatory Notification
- Inform affected clients and provide action steps.
- Comply with legal reporting obligations (e.g., Australian Privacy Act 1988, GDPR).
- Maintain clear, transparent communication.
- Investigation & Recovery
- Perform forensic analysis and document findings.
- Restore systems using secure backups and apply necessary patches.
- Conduct a post-incident security audit.
- Prevention & Continuous Improvement
- Implement long-term security upgrades based on findings.
- Enhance employee training, security policies, and access controls.
- Schedule regular penetration testing and security audits.
- Documentation & Lessons Learned
- Maintain an incident report summarizing cause, actions taken, and prevention strategies.
- Integrate findings into security awareness training and future prevention efforts.
7. Policy Review & Updates
1. Purpose:
2. Scope:
3. Policy Statement
- Company resources, including software platforms, cloud services, and associated devices, must be used strictly for professional purposes related to the execution of client projects and business operations.
- The use of company systems must be in full compliance with contractual obligations, regulatory requirements, and security frameworks established by Bravas Technology’s technology partners, including SafetyCulture and Employment Hero.
4.Acceptable Use Guidelines
- Systems should only be used for legitimate business activities and must not be used for any personal, non-business-related purposes that could interfere with productivity or compromise security.
- Client data should only be accessed, stored, and shared as necessary for the execution of agreed services. Any additional use must be approved by the client and in line with relevant contractual agreements.
- Users must comply with any additional data security and privacy guidelines specified in client contracts or third-party vendor agreements.
5. Prohibited Use
- Unauthorized access to, modification of, or distribution of client or company data.
- Engaging in any activity that compromises the security or integrity of company systems, including bypassing security measures, introducing malware, or engaging in phishing or social engineering attacks.
- Use of company resources for any illegal, unethical, or unauthorized activities, including but not limited to personal financial gain, harassment, or the dissemination of inappropriate content.
- Sharing login credentials or security tokens with unauthorized individuals, or failing to adhere to multi-factor authentication (MFA) requirements.
6.Responsibilities
- Users: All personnel granted access to Bravas Technology’s systems must review, understand, and acknowledge this policy prior to accessing company resources.
- Director: The director, Darcy Patterson, is responsible for ensuring the implementation, periodic review, and enforcement of this policy.
- Security Compliance: Contractors and employees are responsible for maintaining compliance with this policy and reporting any security incidents or policy violations immediately.
7. Enforcement
- Temporary or permanent suspension of system access.
- Termination of contract or engagement with Bravas Technology.
- Legal action in cases where violations involve unauthorized access, data breaches,
or other serious infractions.