Skip to main content
All CollectionsSecurity & Privacy
Encrypted Communications Policy
Encrypted Communications Policy

Requires encryption for all remote network connections, ensuring data protection in transit and preventing unauthorized access.

Tyler Bryden avatar
Written by Tyler Bryden
Updated over 3 weeks ago

1. Purpose

This policy establishes encryption requirements for all remote network connections to ensure data protection in transit and prevent unauthorized access to sensitive information.

2. Scope

This policy applies to all employees, contractors, and third parties who access Speak AI Inc. systems remotely. It covers all communications involving the transmission of sensitive or confidential data.

3. Encryption Requirements

3.1 General Encryption Standards

  • All remote connections must use industry-standard encryption protocols such as TLS 1.2 or higher, IPsec, and SSH.

  • Data in transit must be encrypted using AES-256 or an equivalent secure encryption standard.

  • Legacy encryption protocols (e.g., SSL 3.0, TLS 1.0, and TLS 1.1) are prohibited.

3.2 Secure Remote Access

  • Virtual Private Network (VPN) connections must use strong encryption protocols (e.g., OpenVPN, WireGuard, or IPsec-based VPNs).

  • Multi-Factor Authentication (MFA) is required for all remote access to internal systems.

  • Remote desktop access must be tunneled through a secure VPN or an encrypted remote access gateway.

3.3 Email & Communication Encryption

  • All sensitive emails must be encrypted using end-to-end encryption tools such as S/MIME or PGP.

  • Internal messaging and collaboration tools must support encryption for data in transit.

  • File transfers containing sensitive data must be performed using encrypted channels (e.g., SFTP instead of FTP).

3.4 Wireless & Mobile Encryption

  • Wireless networks accessing internal systems must enforce WPA3 encryption (or WPA2 if WPA3 is unavailable).

  • Mobile device communications must be encrypted using secure mobile device management (MDM) tools.

  • Employees using mobile devices for work must enable device encryption and secure their connections via VPN.

3.5 Monitoring & Compliance

  • Network traffic must be monitored for compliance with encryption standards.

  • Any unauthorized or unencrypted remote connections will be blocked and investigated.

  • Periodic audits must be conducted to ensure encryption policies are followed.

4. Compliance & Enforcement

  • Violations of this policy may result in disciplinary action, including termination of access to remote systems.

  • Employees are responsible for reporting any suspected breaches of encryption policies to the security team at [email protected].

5. References & Supporting Documents

6. Contact Information For any questions regarding this policy, contact [email protected].


This policy is subject to periodic review and updates to align with evolving security best practices and industry regulations.

Did this answer your question?