At Kamsa, security is one of our top priorities. We use state-of-the-art tools and perform continuous monitoring to ensure that your data is protected. Included below are the measures we take to protect our Clients.
Our team commits to comply with our security policies, which follow the criteria set forth by SOC 2. These policies include our Code of Conduct, Acceptable Use Policy, Access Control and Termination Policy, Business Continuity and Disaster Recovery Plan, Change Management Policy, Configuration and Asset Management Policy, Data Classification Policy, Data Retention and Disposal Policy, Encryption and Key Management Policy, Information Security Policy, Internal Control Policy, Network Security Policy, Performance Review Policy, Risk Assessment and Treatment Policy, Secure Development Policy, Security Incident Response Plan, Vendor Management Policy, and Vulnerability and Patch Management Policy.
If you have any concerns, please don’t hesitate to contact us at [email protected]
Would you like to report a potential issue anonymously? Send us a note.