Security Policy 

We aim to give you peace of mind about your user data. We're committed to being clear about our data storage and data retention policies. We'll keep working to safeguard your information.

Security Policy 

Effective Date: November 1, 202

1. Purpose

The purpose of this Security Policy is to protect the integrity, confidentiality, and availability of bhm28.ca’s information systems and data. This policy outlines the security measures and protocols we have implemented to safeguard our digital assets against unauthorized access, breaches, and other security threats.

2. Scope

This policy applies to all employees, contractors, consultants, temporary staff, and other workers at bhm28.ca, including all personnel affiliated with third parties. It covers all data, systems, networks, and devices owned or operated by bhm28.ca.

3. Security Responsibilities

  • Management: Ensure that security policies and procedures are implemented and maintained.
  • Employees: Adhere to security policies and report any security incidents or vulnerabilities.
  • IT Department: Implement and manage security controls, conduct regular security assessments, and respond to security incidents.

4. Access Control

  • User Authentication: All users must use strong passwords and multi-factor authentication where applicable.
  • Access Rights: Access to systems and data is granted based on the principle of least privilege. Users are given the minimum level of access necessary to perform their job functions.
  • Account Management: User accounts are reviewed regularly, and access is revoked promptly upon termination of employment or contract.

5. Data Protection

  • Data Classification: Data is classified based on its sensitivity and importance. Appropriate security measures are applied according to the classification level.
  • Encryption: Sensitive data must be encrypted both in transit and at rest.
  • Data Backup: Regular backups of critical data are performed and stored securely to ensure data recovery in case of loss or breach.

6. Network Security

  • Firewalls and Intrusion Detection: Firewalls and intrusion detection/prevention systems are used to protect the network from unauthorized access and threats.
  • Secure Configuration: All network devices are configured securely, and default passwords are changed.
  • Remote Access: Remote access to the network is restricted and requires secure authentication methods.

7. Physical Security

  • Access Control: Physical access to sensitive areas is restricted to authorized personnel only.
  • Surveillance: Surveillance systems are used to monitor and record access to sensitive areas.
  • Environmental Controls: Measures are in place to protect against environmental threats such as fire, flood, and power outages.

8. Incident Response

  • Incident Reporting: All security incidents must be reported immediately to the IT department.
  • Incident Management: A formal incident response plan is in place to address and mitigate security incidents.
  • Post-Incident Review: After an incident, a review is conducted to identify the cause and implement measures to prevent recurrence.

9. Training and Awareness

  • Security Training: All employees receive regular training on security policies, procedures, and best practices.
  • Awareness Programs: Ongoing awareness programs are conducted to keep employees informed about security threats and how to respond to them.

10. Compliance

  • Legal and Regulatory Compliance: bhm28.ca complies with all applicable laws, regulations, and industry standards related to information security.
  • Policy Review: This policy is reviewed and updated regularly to ensure its effectiveness and compliance with current security standards.

11. Contact Information

For questions or concerns about this Security Policy, please contact:

Security Officer
bhm28.ca

Email: policies@bhm28.ca
Phone: (438) 788-3692

Policy Directory

Concerned About Security?

If you have any questions or concerns about our security policy or need to report a security issue, please contact us. <br>Our team is dedicated to ensuring the safety and protection of your personal information.

Got Questions? We've Got Answers!

Frequently Asked Questions (FAQ)

Welcome to our FAQ section, where we address the most common queries about our policies. We understand that navigating policies can be tricky, so we’ve compiled clear and concise answers to your most pressing questions. If you don’t find what you’re looking for, feel free to reach out to us at policies@bhm28.ca. We’re here to help and committed to providing you with the information you need. Need further assistance? Don’t hesitate to contact us. We’re always here to assist you!

  • We use industry-standard security measures, including encryption, firewalls, and secure servers, to protect your personal information from unauthorized access, disclosure, alteration, or destruction.
  • If you suspect a security breach, please contact us immediately at policies@bhm28.ca. We will investigate the issue and take appropriate action to secure your information.
  • In the event of a data breach, we will contain the breach, assess the risks, notify affected individuals if there is a real risk of significant harm, report to authorities if necessary, and implement measures to prevent future breaches.
  • Yes, we use encryption to protect your data both in transit and at rest. This ensures that your information is secure and cannot be accessed by unauthorized parties.
  • We regularly review and update our security measures to ensure they are effective against the latest threats. This includes updating our software, conducting security audits, and training our staff on security best practices.

 

  • To ensure your account is secure, use a strong, unique password, enable two-factor authentication if available, and regularly update your password. Avoid sharing your login details with others.
  • We use secure payment gateways and SSL (Secure Socket Layer) technology to protect your online transactions. This ensures that your payment information is encrypted and secure.
  • We continuously monitor our systems for security threats using advanced security tools and techniques. This helps us detect and respond to potential threats promptly.
  • If you receive a suspicious email claiming to be from our company, do not click on any links or provide any personal information. Please forward the email to policies@bhm28.ca so we can investigate.
  • For more information about our security practices, please contact our security team at policies@bhm28.ca. We are here to answer any questions you may have.