Incident Policy

Detecting a security incident in our organization starts with:

1. Immediate activation of the incident team: the CEO, the VP of operations and the head of development

2. Identification of the type of incident: data leakage or compromise, unauthorized access, information interception, ransomware, blocking legitimate access.

3. Stop all users and systems from accessing the system immediately.

4. document the incident;

5. In the event of data leakage or compromise or unauthorized access, contact the Amazon security team immediately or within 24 hours at [email protected]

6. apply corrections to the system so that the failure does not recur in the future

Considering the complexity of security levels and ways of attacking cybercriminals today, we do a bi-monthly review of security control and incident response protocols.