{"id":2065,"date":"2023-04-25T11:56:19","date_gmt":"2023-04-25T09:56:19","guid":{"rendered":"https:\/\/www.accuracy.com\/?page_id=2065"},"modified":"2023-10-15T21:45:25","modified_gmt":"2023-10-15T19:45:25","slug":"data-security-management-policy","status":"publish","type":"page","link":"https:\/\/www.accuracy.com\/en_gb\/privacy\/data-security-management-policy\/","title":{"rendered":"Data Security Management Policy"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"2065\" class=\"elementor elementor-2065\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-89a49d8 e-con-full e-flex e-con e-parent\" data-id=\"89a49d8\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-9f1f56b e-con-full e-flex e-con e-child\" data-id=\"9f1f56b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bf98d35 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"bf98d35\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Accuracy data security management policy<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bc0db9c e-flex e-con-boxed e-con e-parent\" data-id=\"bc0db9c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7b59800 e-con-full e-flex e-con e-child\" data-id=\"7b59800\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c89b9f5 elementor-widget elementor-widget-text-editor\" data-id=\"c89b9f5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h4>1.1 CONFIDENTIALITY<\/h4><p>Accuracy places strict controls over Accuracy employees\u2019 access to the data Client and Client\u2019s authorised users (\u201cAuthorised Users\u201d) make available via Accuracy\u2019s Services, as more specifically defined in Client\u2019s agreement with Accuracy covering the use of Accuracy\u2019s Services (\u201cClient Data\u201d), and Accuracy is committed to ensuring that Client Data is not seen by anyone who should not have access to it. The operation of Accuracy\u2019s Services requires that some employees have access to the systems which store and process Client Data. These employees are prohibited from using these permissions to view Client Data unless it is reasonably necessary to do so. Accuracy has technical controls and audit policies in place to ensure that any access to Client Data is logged. All of Accuracy\u2019s employees and contract personnel are bound to Accuracy\u2019s policies regarding Client Data, and Accuracy treats these issues as matters of the highest importance within Accuracy.<\/p><h4>1.2. COMPLIANCE<\/h4><p>The environment that hosts Accuracy&#8217;s Services maintains multiple certifications for its data centres, including ISO 27001 compliance, PCI Certification and SOC reports.<\/p><h4>1.3. SECURITY FEATURES FOR TEAM MEMBERS AND ADMINISTRATORS<\/h4><p>In addition to the work Accuracy does at the infrastructure level, Accuracy provides different administrator teams with defined levels of access to its IT infrastructure and systems.<br \/>These administrator teams comprise:<\/p><ul><li>Accuracy\u2019s IT Hotline<\/li><li>Accuracy\u2019s IT Support Services<\/li><li>Accuracy\u2019s IT Administrators<\/li><\/ul><h4>1.4. ACCESS LOGGING<\/h4><p>Detailed access logs are available to Authorised IT Administrators. Accuracy logs every time an account signs in, noting the media access control (MAC) address (for the type of device used) and the IP address of the connection.<\/p><h4>1.5. TWO-FACTOR AUTHENTICATION<\/h4><p>Accuracy IT Administrators can enable two-factor authentication.<\/p><h4>1.6 SINGLE SIGN-ON<\/h4><p>Accuracy employees can access Accuracy applications and solutions with a variety of single sign-ons.<\/p><h4>1.7. DATA RETENTION<\/h4><p>Accuracy IT Administrators can configure custom retention policies.<\/p><h4>1.8 DELETION OF CLIENT DATA<\/h4><p>Accuracy provides the option for clients to delete Client Data at any time.<\/p><h4>1.9 RETURN OF CLIENT DATA<\/h4><p>Accuracy IT Administrators can be granted access to export Client Data.<\/p><h4>1.10 DATA ENCRYPTION IN-TRANSIT<\/h4><p>At the option of the Client, Accuracy&#8217;s Services support the latest recommended secure cipher suites and protocols to encrypt all traffic in transit. Accuracy monitors the changing cryptographic landscape closely and works promptly to upgrade the service to respond to new cryptographic weaknesses as they are discovered and implement best practices as they evolve, while also balancing the need for compatibility for older clients.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-95a5290 elementor-widget elementor-widget-text-editor\" data-id=\"95a5290\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h4>1.11 AVAILABILITY<\/h4><p>Accuracy understands that Clients rely on Accuracy\u2019s Services to work. Accuracy is committed to making the platform a highly available service that the Client can count on. Accuracy\u2019s infrastructure runs on systems that are fault tolerant for failures of individual servers. Accuracy\u2019s operations team tests disaster-recovery measures regularly and staffs an around-the-clock on-call team to quickly resolve unexpected incidents.<\/p><h4>1.12 DISASTER RECOVERY<\/h4><p>Client Data is stored redundantly in Accuracy\u2019s hosting provider\u2019s data centres to ensure availability. Accuracy has well-tested backup and restoration procedures, which allow recovery from a major disaster. Client Data and Accuracy\u2019s source codes are automatically backed up nightly. The Operations team is alerted in case of a failure with this system.<\/p><h4>1.13 NETWORK PROTECTION<\/h4><p>In addition to sophisticated system monitoring and logging, Accuracy has implemented check points for all server and network access across Accuracy\u2019s production environment. Firewalls are configured according to industry best practices and ports are blocked by configuration unless specifically opened.<\/p><h4>1.14 HOST MANAGEMENT<\/h4><p>Accuracy performs automated vulnerability scans on Accuracy\u2019s production hosts and re-mediates any findings that present a risk to Accuracy\u2019s environment. Accuracy enforces screen lockouts.<\/p><h4>1.15 LOGGING<\/h4><p>Accuracy maintains an extensive, centralised logging environment in its production environment which contains information pertaining to security, monitoring, availability, access, and other metrics about the Accuracy services. These logs are analysed for security events via automated monitoring software, overseen by the IT Administrators.<\/p><h4>1.16 PRODUCT SECURITY PRACTICES<\/h4><p>New features, functionality, and design changes go through a security review process facilitated by the IT Administrators. The IT Administrators work closely with development teams to resolve any additional security concerns that may arise during development.<\/p><h4>1.17 INCIDENT MANAGEMENT &amp; RESPONSE<\/h4><p>In the event of a security breach, Accuracy will promptly notify Client of any unauthorised access to Client Data. Accuracy has incident management policies and procedures in place to handle such an event.<\/p><h4>1.18 PERSONAL PRACTICES<\/h4><p>Accuracy conducts background checks on all employees before employment, and employees receive security training during onboarding as well as on an ongoing basis. All employees are required to read and sign Accuracy\u2019s comprehensive information security policy covering the security, availability, and confidentiality of Accuracy&#8217;s Services.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Accuracy data security management policy 1.1 CONFIDENTIALITY Accuracy places strict controls over Accuracy employees\u2019 access to the data Client and Client\u2019s authorised users (\u201cAuthorised Users\u201d) make available via Accuracy\u2019s Services, as more specifically defined in Client\u2019s agreement with Accuracy covering the use of Accuracy\u2019s Services (\u201cClient Data\u201d), and Accuracy is committed to ensuring that Client [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":2058,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-2065","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Data Security Management Policy - Accuracy<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.accuracy.com\/en_gb\/privacy\/data-security-management-policy\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Security Management Policy\" \/>\n<meta property=\"og:description\" content=\"Accuracy data security management policy 1.1 CONFIDENTIALITY Accuracy places strict controls over Accuracy employees\u2019 access to the data Client and Client\u2019s authorised users (\u201cAuthorised Users\u201d) make available via Accuracy\u2019s Services, as more specifically defined in Client\u2019s agreement with Accuracy covering the use of Accuracy\u2019s Services (\u201cClient Data\u201d), and Accuracy is committed to ensuring that Client [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.accuracy.com\/en_gb\/privacy\/data-security-management-policy\/\" \/>\n<meta property=\"og:site_name\" content=\"Accuracy\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-15T19:45:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.accuracy.com\/wp-content\/uploads\/2023\/10\/Accuracy.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/en_gb\\\/privacy\\\/data-security-management-policy\\\/\",\"url\":\"https:\\\/\\\/www.accuracy.com\\\/en_gb\\\/privacy\\\/data-security-management-policy\\\/\",\"name\":\"Data Security Management Policy - Accuracy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/#website\"},\"datePublished\":\"2023-04-25T09:56:19+00:00\",\"dateModified\":\"2023-10-15T19:45:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/en_gb\\\/privacy\\\/data-security-management-policy\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.accuracy.com\\\/en_gb\\\/privacy\\\/data-security-management-policy\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/en_gb\\\/privacy\\\/data-security-management-policy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.accuracy.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Privacy\",\"item\":\"https:\\\/\\\/www.accuracy.com\\\/privacy\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Data Security Management Policy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/#website\",\"url\":\"https:\\\/\\\/www.accuracy.com\\\/\",\"name\":\"Accuracy\",\"description\":\"Business Advisers - Financial Consultants\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.accuracy.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/#organization\",\"name\":\"Accuracy\",\"url\":\"https:\\\/\\\/www.accuracy.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.accuracy.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/unnamed-3.jpg\",\"contentUrl\":\"https:\\\/\\\/www.accuracy.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/unnamed-3.jpg\",\"width\":512,\"height\":512,\"caption\":\"Accuracy\"},\"image\":{\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/accuracy\\\/?originalSubdomain=fr\",\"https:\\\/\\\/www.instagram.com\\\/accuracycareers\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Data Security Management Policy - Accuracy","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.accuracy.com\/en_gb\/privacy\/data-security-management-policy\/","og_locale":"en_GB","og_type":"article","og_title":"Data Security Management Policy","og_description":"Accuracy data security management policy 1.1 CONFIDENTIALITY Accuracy places strict controls over Accuracy employees\u2019 access to the data Client and Client\u2019s authorised users (\u201cAuthorised Users\u201d) make available via Accuracy\u2019s Services, as more specifically defined in Client\u2019s agreement with Accuracy covering the use of Accuracy\u2019s Services (\u201cClient Data\u201d), and Accuracy is committed to ensuring that Client [&hellip;]","og_url":"https:\/\/www.accuracy.com\/en_gb\/privacy\/data-security-management-policy\/","og_site_name":"Accuracy","article_modified_time":"2023-10-15T19:45:25+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/www.accuracy.com\/wp-content\/uploads\/2023\/10\/Accuracy.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.accuracy.com\/en_gb\/privacy\/data-security-management-policy\/","url":"https:\/\/www.accuracy.com\/en_gb\/privacy\/data-security-management-policy\/","name":"Data Security Management Policy - Accuracy","isPartOf":{"@id":"https:\/\/www.accuracy.com\/#website"},"datePublished":"2023-04-25T09:56:19+00:00","dateModified":"2023-10-15T19:45:25+00:00","breadcrumb":{"@id":"https:\/\/www.accuracy.com\/en_gb\/privacy\/data-security-management-policy\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.accuracy.com\/en_gb\/privacy\/data-security-management-policy\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.accuracy.com\/en_gb\/privacy\/data-security-management-policy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.accuracy.com\/"},{"@type":"ListItem","position":2,"name":"Privacy","item":"https:\/\/www.accuracy.com\/privacy\/"},{"@type":"ListItem","position":3,"name":"Data Security Management Policy"}]},{"@type":"WebSite","@id":"https:\/\/www.accuracy.com\/#website","url":"https:\/\/www.accuracy.com\/","name":"Accuracy","description":"Business Advisers - Financial Consultants","publisher":{"@id":"https:\/\/www.accuracy.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.accuracy.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.accuracy.com\/#organization","name":"Accuracy","url":"https:\/\/www.accuracy.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.accuracy.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.accuracy.com\/wp-content\/uploads\/2023\/08\/unnamed-3.jpg","contentUrl":"https:\/\/www.accuracy.com\/wp-content\/uploads\/2023\/08\/unnamed-3.jpg","width":512,"height":512,"caption":"Accuracy"},"image":{"@id":"https:\/\/www.accuracy.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/accuracy\/?originalSubdomain=fr","https:\/\/www.instagram.com\/accuracycareers\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.accuracy.com\/en_gb\/wp-json\/wp\/v2\/pages\/2065","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.accuracy.com\/en_gb\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.accuracy.com\/en_gb\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.accuracy.com\/en_gb\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.accuracy.com\/en_gb\/wp-json\/wp\/v2\/comments?post=2065"}],"version-history":[{"count":3,"href":"https:\/\/www.accuracy.com\/en_gb\/wp-json\/wp\/v2\/pages\/2065\/revisions"}],"predecessor-version":[{"id":37951,"href":"https:\/\/www.accuracy.com\/en_gb\/wp-json\/wp\/v2\/pages\/2065\/revisions\/37951"}],"up":[{"embeddable":true,"href":"https:\/\/www.accuracy.com\/en_gb\/wp-json\/wp\/v2\/pages\/2058"}],"wp:attachment":[{"href":"https:\/\/www.accuracy.com\/en_gb\/wp-json\/wp\/v2\/media?parent=2065"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}