Security Program Addendum
Effective as of January 17, 2023
Power Accelerate has implemented and shall maintain a commercially reasonable information security program, which shall include technical and organizational measures designed to ensure an appropriate level of security for Customer and Other Data taking into account the risks presented by the processing, in particular from accidental or unlawful destruction, loss, alteration, or unauthorized disclosure of, or access to Customer or Other Data, and the nature of the Customer or Other Data to be protected having regard to the state of the art and the cost of implementation. This document communicates the security program applicable to the Power Accelerate Service, in accordance with Power Accelerate’s Terms of Service or Master Service Agreement as applicable (collectively, the “Agreement”). Except as otherwise modified or defined herein, capitalized terms shall have the same meaning as in the Agreement.
1. Security Program.
1.1. Information Security Management System (ISMS). Power Accelerate shall maintain an ISMS risk-based security program to systematically manage and protect the organization’s business information and the information of its customers and partners.
1.2. Security Governance Committee. Power Accelerate shall maintain a security committee comprised of leaders across business units that oversees the company’s security program. This committee shall meet regularly to review the operational status of the ISMS (including risks, threats, remediation actions, and other security-related issues) and drive continuous security improvement throughout the business.
1.3. Security Incident Response Policy. Power Accelerate shall maintain policies and procedures to (1) investigate and respond to security incidents, including procedures to assess the threat of relevant vulnerabilities or security incidents using defined incident classifications and categorizations and (2) establish remediation and mitigation actions for events, including artifact and evidence collection procedures and defined remediation steps.
1.4. Policy Maintenance. All security and privacy related policies shall be documented, reviewed, updated, and approved by management at least annually.
1.5. Communication and Commitment. Security and privacy policies and procedures shall be published and communicated to all relevant and applicable personnel and subcontractors. Security shall be addressed at the highest levels of the company with executive management regularly discussing security issues and leading company-wide security initiatives.
2. Personnel Security.
2.1. Background Screening. Personnel who have access to Customer Data shall be subject to background screening (as allowed by local laws) that shall include verification of identity, right to work and academic degrees and a check of criminal records, and sex offender registries.
2.2. Confidentiality Obligations. Personnel who have access to Customer Data shall be subject to a binding contractual obligation with Power Accelerate to keep the Customer Data confidential.
2.3. Security Awareness Training. Personnel shall receive training upon hire and at least annually thereafter covering security practices and privacy principles.
2.4. Code of Conduct. Power Accelerate shall maintain a code of conduct and business ethics policy requiring ethical behaviour and compliance with applicable laws and regulations.
3. Third-Party Security.
3.1. Screening. Power Accelerate shall maintain policies and procedures designed to ensure that all new sub-processors, SaaS applications, IT software, and IT service solutions are subject to reasonable due diligence to confirm their ability to meet corporate security and compliance requirements as well as business objectives.
3.2. Contractual Obligations. Power Accelerate shall maintain controls designed to ensure that contractual agreements with sub-processors include confidentiality and privacy provisions as appropriate to protect Power Accelerate’s interests and to ensure Power Accelerate can meet its security and privacy obligations to customers, partners, employees, regulators, and other stakeholders.
3.3. Monitoring and Review. As practicable, Power Accelerate shall periodically review existing third-party sub-processors in a manner designed to ensure the sub-processor’s compliance with contractual terms, including any security and availability requirements. This review program shall review sub-processors at least annually (regardless of length of contractual term) to determine whether the sub-processor/solution is still meeting the company’s objectives and the sub-processor’s performance, security, and compliance postures are still appropriate given the type of access and classification of data being accessed, controls necessary to protect data, and applicable legal and regulatory requirements.
4. Physical Security.
4.1. Corporate Data Center Security. Power Accelerate’s systems used to process Customer Data shall be protected by measures designed to control logical or physical access; equipment used to process Customer Data cannot be upgraded or reconfigured without appropriate authorization and protection of the information; and Customer Data shall be disposed of in a manner that would prevent its reconstruction.
4.2. Power Accelerate Service Data Center Security. Power Accelerate leverages Microsoft Azure data centers for hosting the Power Accelerate Service. Microsoft follows industry best practices and complies with numerous standards.
5. Solution Security.
5.1. Software Development Life Cycle (SDLC). Power Accelerate shall maintain a software development life cycle policy that defines the process by which personnel create secure products and services and the activities that personnel must perform at various stages of development (requirements, design, implementation, verification, documentation and delivery).
5.2. Secure Development. Product management, development, test and deployment teams are required to follow secure application development policies and procedures that are aligned to industry-standard practices, such as the OWASP Top 10.
5.3. Vulnerability Assessment. Power Accelerate shall conduct risk assessments, vulnerability scans and audits. Identified product solution issues shall be scored using the Common Vulnerability Scoring System (CVSS) risk-scoring methodology based on risk impact level and the likelihood and potential consequences of an issue occurring. Vulnerabilities are remediated on the basis of assessed risk.
6. Operational Security.
6.1. Access Controls. Power Accelerate shall maintain policies, procedures, and logical controls to establish access authorizations for employees and third parties. Such controls shall include:
6.1.1. requiring unique user IDs to identify any user who accesses systems or Customer Data;
6.1.2. managing privileged access credentials in a privileged account management (PAM) system;
6.1.3. requiring that user passwords are (a) of sufficient length; (b) stored in an encrypted format; (c) subject to reuse limitations; and
6.1.4. automatically locking out users’ IDs when a number of erroneous passwords have been entered.
6.2. Least Privilege. Personnel shall only be permitted access to systems and data as required for the performance of their roles; only authorized personnel are permitted physical access to infrastructure and equipment; authorized access to production resources for the Power Accelerate Service is restricted to employees requiring access; and access rights are reviewed and certified at least annually.
6.3. Malware. Power Accelerate shall utilize measures intended to detect and remediate malware, viruses, ransomware, spyware, and other intentionally harmful programs that may be used to gain unauthorized access to information or systems.
6.4. Encryption. Power Accelerate shall use Internet industry-standard encryption methods to protect data in transit and at rest as appropriate to the sensitivity of the data and the risks associated with loss; all laptops and other removable media, including backups shall be encrypted.
6.5. Business Continuity and Disaster Recovery (BCDR). Power Accelerate shall maintain formal BCDR plans designed to ensure Power Accelerate’s systems and services remain resilient in the event of a failure, including natural disasters or system failures, and such plans shall be reviewed, updated, and approved by management at least annually.
6.6. Data Backups. Power Accelerate shall backup data and systems using alternative site storage available for restore in case of failure of the primary system. All backups shall use Internet industry-standard encryption methods to protect backups in transit and at rest.
6.7. Change Management. Power Accelerate shall maintain change management policies and procedures to plan, test, schedule, communicate, and execute changes to the infrastructure, systems, networks, and applications applicable to the Power Accelerate Service.
6.8. Network Security. Power Accelerate shall implement industry-standard technologies and controls designed to protect network security, including firewalls, intrusion detection systems, monitoring, and network segmentation. Networks shall be designed and configured to restrict connections between trusted and untrusted networks, and network designs and controls shall be reviewed at least annually.
6.9. Data Segregation. Power Accelerate shall implement logical controls, including logical separation, access controls and encryption, to segregate Customer’s Personal Data from other Customer and Power Accelerate data in the Power Accelerate Service. Power Accelerate shall additionally ensure that production and non-production data and systems are separated.