Access to CloudCore systems and application is limited for all users, including but not limited to workforce members, volunteers, business associates, contracted providers…
At CloudCore Networks, our commitment to delivering exceptional service and maintaining the highest standards of security and performance is reflected in our meticulously…
Asset Inventory Management You can’t protect what you can’t see.
To provide guidance for breach notification when impressive or unauthorised access, acquisition, use and/or disclosure of the ePHI occurs.
The CloudCore Contingency Plan establishes procedures to recover CloudCore following a disruption resulting from a disaster.
CloudCore change management policy establishes controlled processes for managing changes to information systems, infrastructure, and business processes to maintain security…
CloudCore may be requested occasionally to share additional details regarding its compliance, privacy and security program by an external entity such as a customer, media…
CloudCore standardises and automates configuration management through the use of automation scripts as well as documentation of all changes to production systems and…
We at CloudCore (CloudCore and our subsidiaries and affiliates) are committed to protecting your privacy.
CloudCore data classification policy establishes a systematic approach to categorising information assets based on their sensitivity, criticality, and regulatory…
This policy outlines the requirements and controls/procedures CloudCore has implemented to manage the end-to-end data lifecycle, from data creation/acquisition to retention…
CloudCore takes the confidentiality and integrity of its customer data very seriously.
The Policy Document Numbering System is established to provide a structured and consistent method for assigning document numbers to all policy documents within CloudCore.
It is the goal of CloudCore to provide a safe and secure environment for all employees.
This Data Protection Addendum (this “Addendum”) is made and entered into as of the date appearing on the signature page hereto (the “Effective Date”) by and between…
CloudCore HIPAA Business Associate Agreement (“BAA”) ## Introduction This document includes sample business associate agreement provisions to help covered entities and…
CloudCore is committed to ensuring all workforce members actively address security and compliance in their roles at CloudCore.
CloudCore implements an information security incident response process to consistently detect, respond, and report incidents, minimise loss and destruction, mitigate the…
CloudCore recognises that media containing sensitive data may be reused when appropriate steps are taken to ensure that all stored sensitive data has been effectively…
CloudCore implements policies and procedures to maintain compliance and integrity of data.
Policy Statements CloudCore is committed to protecting the privacy of our customers.
This policy establishes the scope, objectives, and procedures of CloudCore’s information security risk management process.
Security and compliance is everyone’s responsibility.
CloudCore development team follows the latest security best practices when developing software, and automates security testing throughout development lifecycle whenever…
In the digital age, cyber attacks are inevitable.
CloudCore shall audit, monitor, and assess the access and activity of systems and applications that process or store production and/or sensitive data such as personally…
CloudCore makes every effort to assure all third party organisations are compliant and do not compromise the integrity, security, and privacy of CloudCore or CloudCore…
In order to preserve the integrity of data that CloudCore stores, processes, or transmits for Customers, CloudCore implements strong intrusion detection tools and policies…
Policy Statements CloudCore policy requires that: (a) All product systems must be scanned for vulnerability at least quarterly and with each major change.