1. Purpose
This policy establishes encryption requirements for all remote network connections to ensure data protection in transit and prevent unauthorized access to sensitive information.
2. Scope
This policy applies to all employees, contractors, and third parties who access Speak AI Inc. systems remotely. It covers all communications involving the transmission of sensitive or confidential data.
3. Encryption Requirements
3.1 General Encryption Standards
All remote connections must use industry-standard encryption protocols such as TLS 1.2 or higher, IPsec, and SSH.
Data in transit must be encrypted using AES-256 or an equivalent secure encryption standard.
Legacy encryption protocols (e.g., SSL 3.0, TLS 1.0, and TLS 1.1) are prohibited.
3.2 Secure Remote Access
Virtual Private Network (VPN) connections must use strong encryption protocols (e.g., OpenVPN, WireGuard, or IPsec-based VPNs).
Multi-Factor Authentication (MFA) is required for all remote access to internal systems.
Remote desktop access must be tunneled through a secure VPN or an encrypted remote access gateway.
3.3 Email & Communication Encryption
All sensitive emails must be encrypted using end-to-end encryption tools such as S/MIME or PGP.
Internal messaging and collaboration tools must support encryption for data in transit.
File transfers containing sensitive data must be performed using encrypted channels (e.g., SFTP instead of FTP).
3.4 Wireless & Mobile Encryption
Wireless networks accessing internal systems must enforce WPA3 encryption (or WPA2 if WPA3 is unavailable).
Mobile device communications must be encrypted using secure mobile device management (MDM) tools.
Employees using mobile devices for work must enable device encryption and secure their connections via VPN.
3.5 Monitoring & Compliance
Network traffic must be monitored for compliance with encryption standards.
Any unauthorized or unencrypted remote connections will be blocked and investigated.
Periodic audits must be conducted to ensure encryption policies are followed.
4. Compliance & Enforcement
Violations of this policy may result in disciplinary action, including termination of access to remote systems.
Employees are responsible for reporting any suspected breaches of encryption policies to the security team at [email protected].
5. References & Supporting Documents
Speak AI Network Security Policy: https://help.speakai.co/en/articles/9363486-network-security-policy
Speak AI Access Management Policy: https://help.speakai.co/en/articles/9363448-access-management-policy
Speak AI Vulnerability Management Policy: https://help.speakai.co/en/articles/9369290-vulnerability-management-policy
6. Contact Information For any questions regarding this policy, contact [email protected].
This policy is subject to periodic review and updates to align with evolving security best practices and industry regulations.