Skip to main content
Skip table of contents

Information Security Policy

Purpose

The purpose of this policy is to establish an Information Security Program which protects the confidentiality, integrity, and availability of SaaSJet's data and assets.

The program defines and implements safeguards that help SaaSJet prevent unauthorized access, disclosure, loss, or inappropriate use of data. It aims to ensure that data is protected, both during transmission and at rest, from internal, external, accidental, and deliberate threats.

Scope

The policy applies to all employees of SaaSJet, and all systems and data owned by it.

Ownership

Maksym Denys is responsible for implementing and maintaining this policy.

Policy Statement

The Information Security Program institutes technical, physical, and administrative safeguards to protect data and assets from unauthorized access, disclosure, or inappropriate use. The program establishes requirements and standards, and organizes them into Policy documents. Policies encompass, but are not limited to the areas listed below.

Backup

SaaSJet's backup procedures are documented in its Backup Policy. The purpose of this policy is to institute the necessary controls to mitigate the accidental loss of SaaSJet data. These controls assume that events such as accidental data corruption, deletion, or destruction will occur, and mitigate the impact of such events by maintaining reliable backup copies from which data can be readily restored.

Encryption

Encryption practices are documented in SaaSJet's Encryption Policy. The purpose of this policy is to establish practices for protecting SaaSJet data in the event of unauthorized access through the use of encryption. The policy describes the different components that can be configured to utilize encryption, the algorithm that must be used for each, and how encryption keys should be managed.

Change Management

SaaSJet's change management process is documented in its Change Management Policy. The purpose of this policy is to provide guidance on the process of managing change across SaaSJet's critical systems and products in order to ensure that sufficient checks and balances are in place to mitigate the risks inherent in continuous product development.

Vulnerability Management

SaaSJet's Vulnerability Management program is documented in the Vulnerability Management Policy. The purpose of this policy is to establish vulnerability management controls and provide guidelines for their implementation. Vulnerability management encompasses source code, operating systems, runtimes, and devices, and vulnerability scans are performed externally via penetration testing and web application scans.

Access Control

SaaSJet's access control practices are documented in its Access Control Policy. The purpose of this policy is to establish the principles and guidelines for controlling access to systems owned by SaaSJet.

Authentication and Password

SaaSJet's approach to authentication and password management is documented in SaaSJet's Authentication and Password Policy. This policy describes SaaSJet's requirements with regards to account authentication, including how passwords should be generated, used, and protected. Security Incident Response

SaaSJet's procedures for handling security incidents are documented in its Security Incident Management Policy. The purpose of this policy is to establish requirements and plans for reporting and responding to security incidents impacting SaaSJet's corporate or customer systems.

Business Continuity

SaaSJet's business continuity plan is documented in the Business Continuity Policy. The purpose of this policy is to establish requirements and plans to recover SaaSJet operations following a disruption due to causes such as natural disaster, loss of access to premises, pandemic, or malicious activity from external or internal sources.

Risk Management

SaaSJet maintains a risk management program to identify, prioritize, and mitigate risk to acceptable levels.

The program consists of regularly performed risk assessments, which identify and prioritize security and compliance gaps, and recommend additional security controls needed to mitigate the risk carried by the gaps.

Policy Management

The company develops and maintains formal policies that govern information security within the company. The policies are formally reviewed and approved at least once a year, and are communicated to all employees.

Policy Creation

SaaSJet's management team is responsible for creating policies and supporting any relevant requirements and activities through sufficient staffing and budget allocation. The management team is also responsible for ensuring that SaaSJet's staff is trained to understand and remain familiar with all relevant policies, and for keeping policies available for review both internally and externally by customers and partners.

Policy Reviews

Maksym Denys is responsible for ensuring all SaaSJet information security policies are reviewed at least annually by SaaSJet management, and re-approved or updated as necessary.

Existing policies may be updated and new policies may be created for reasons including:

  1. Complying with applicable laws and regulations

  2. Complying with new requirements for certification and governance by the company or its customers

  3. Addressing new threats

  4. Technological or business requirements

Policy Retention

As policies and procedures are updated over time to reflect the evolving nature of SaaSJet and its business. All changes in policies are recorded using the approval procedure in the TrustCloud platform

Current versions of SaaSJet's policies and procedures are stored in its compliance management tool, TrustCloud and in this folder in Google Drive inside Google Workspace platform. In addition, these policies and procedures are made freely available to all SaaSJet employees.

Security Awareness Training

Security awareness training is provided to new employees, and to all employees on a recurring annual basis, to promote strong security practices for the whole company.

All workforce members are required to complete Security Awareness Training shortly after they join the company and annually thereafter. In addition, they may be asked to complete further training as dictated by operational or environmental changes.

Changes that might lead to adjustment of the training program include:

  1. A security incident retrospective determining that additional training is required

  2. Adoption of new technology by the company Material changes in organizational policies

  3. A record of the successful completion of each training session must be recorded for each employee. The record may be automatically collected by the training system, or manually gathered by the trainer. Records are retained for a period dictated by compliance and legal requirements.

Maksym Denys is responsible for creating the training program, and for selecting and updating training material over time. The program may be delivered internally, by qualified personnel, or by a third-party vendor.

Security Officer

Management and the Board of Directors consider requirements relevant to security, availability, processing integrity, and confidentiality. These considerations are documented in the company's Information Security Policy, which specifically delegates the overall responsibility of security to the Security Officer.

Security Officer, Maksym Denys, at SaaSJet is responsible for creating, approving, and enforcing security policies and procedures, leading the monitoring, vulnerability management, and incident detection and response initiatives, and tracking and reducing risk across the organization.

Security Officer and their supporting team are responsible for setting the direction of and taking the authoritative role in SaaSJet's Information Security Program and related activities, including:

  1. Coordinating internal and external assessments Designing and implementing security controls

  2. Leading security incident response activities

  3. Monitoring systems and networks to detect vulnerabilities and misconfigurations, and to promptly resolve them

  4. Regular testing of all security controls

Approval History

Date

Name

Role

Comment

Pavlo Blozva

CAO

Annual Policies Review. No major changes

Pavlo Blozva

CAO

Minor improvements to the Policies storage

Pavlo Blozva

CAO

Basic Approval

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.