Last modified: February 18, 2019

 

Our promise to uphold the privacy of PII (personally identifiable data) to the best of our ability is backed by our security practices and that of our associates and sub-processors

  1. A culture of privacy is developed and nurtured throughout our corporate organization. Periodic cybersecurity awareness training and knowledge checks are conducted with every employee.
  2. Best security practices are identified, implemented, and periodically assessed and adjusted in relation to our corporate operations as well as with our sub-processors.
  3. Annual third-party graybox penetration tests are conducted of my.pdpworks.com and mitigation is performed as needed. (Certification will be displayed here soon.)
  4. Monthly vulnerability scans are also run and the results are evaluated and action taken if needed.
  5. Monthly PCI compliance scans are conducted of my.pdpworks.com, our other websites, and our corporate operations to ensure the safety of all credit card transactions.
  6. All upgrades, updates, or changes to my.pdpworks.com or our operations are evaluated for their potential impact to ongoing data privacy and security.
  7. The principle-of-least-privilege is practiced among our employees, consultants, and associates to constrain exposure of PII only to those authorized.
  8. Should any level of data breech be experienced, the event is detailed and logged and when appropriate, reported to the appropriate data protection authorities.
  9. Data for my.pdpworks.com is securely backed-up many times each day. The Recovery Point Objective (RPO) is as short as 2-hours and the Recovery Time Objective (RTO) is as short as 1 hour.
  10. All back-ups are encrypted at rest and during transit and have very limited accessibility.
  11. All data in transit for all web properties is encrypted.
  12. Best practice password policies are uniformly enforced among all staff.
  13. All security and privacy practices are regularly reviewed and updated as needed.

 

 

Related Documents

  1. Privacy Policy
  2. Cookie Policy
  3. Our Trusted Sub-Processors
  4. Security Practice
  5. Our Certified Privacy Shield Participation