Skip to main content
All CollectionsSecurity & Privacy
Information Security Program Policy
Information Security Program Policy
Tyler Bryden avatar
Written by Tyler Bryden
Updated over 7 months ago

1. Purpose and Scope

The purpose of this Information Security Program Policy is to establish the framework and principles for protecting the confidentiality, integrity, and availability of information and systems within Speak Ai Inc. ("Speak Ai"). This policy applies to all employees, contractors, and third parties accessing Speak Ai's information systems and data.

2. Policy Statement

Speak Ai is committed to maintaining a robust information security program that aligns with industry best practices and regulatory requirements. This policy outlines the strategies and controls implemented to safeguard sensitive data, manage risks, and ensure compliance with applicable laws and standards.

3. Information Security Objectives

The primary objectives of Speak Ai's information security program are:

  • To protect the confidentiality, integrity, and availability of information.

  • To identify and mitigate security risks.

  • To ensure compliance with relevant legal, regulatory, and contractual requirements.

  • To promote a security-conscious culture within the organization.

4. Roles and Responsibilities

  • Chief Technology Officer (CTO): Responsible for the overall development, implementation, and management of the information security program.

  • IT Team: Tasked with monitoring, assessing, and responding to security threats and incidents.

  • All Employees and Contractors: Required to adhere to the information security policies and procedures and report any security incidents.

5. Risk Management

Speak Ai employs a risk-based approach to information security management, which includes:

  • Conducting regular risk assessments to identify potential threats and vulnerabilities.

  • Implementing appropriate controls to mitigate identified risks.

  • Continuously monitoring and reviewing the effectiveness of risk management activities.

6. Data Protection

  • Data Encryption: All sensitive data, including personal and sensitive information, is encrypted at rest and in transit using industry-standard encryption protocols.

  • Data Retention and Deletion: Data is retained only for as long as necessary to fulfill its intended purpose and is securely deleted according to the Data Retention Policy​​.

  • Access Controls: Access to sensitive data is restricted to authorized personnel only and is enforced through strong authentication and authorization mechanisms.

7. Incident Response

Speak Ai has established an incident response plan to effectively manage and respond to security incidents. This includes:

  • Immediate containment and mitigation of the incident.

  • Investigation and analysis to determine the root cause.

  • Communication with affected stakeholders.

  • Implementation of corrective actions to prevent recurrence.

8. Security Awareness and Training

All employees and contractors are required to participate in regular security awareness and training programs. These programs are designed to educate staff on security best practices, the importance of data protection, and how to recognize and respond to security threats.

9. Compliance and Audit

Speak Ai ensures compliance with relevant legal, regulatory, and contractual requirements through:

Regular internal and external audits of the information security program.

Continuous monitoring and updating of security policies and procedures to reflect changes in regulatory requirements and industry standards.

10. Policy Review

This policy will be reviewed on an annual basis or as needed to ensure its relevance and effectiveness in addressing information security challenges. The review process will consider feedback from stakeholders, changes in the threat landscape, and advancements in security technologies.

11. Contact Information

For any inquiries or requests related to this Information Security Program Policy, please contact the Information Security Team at [email protected].

Did this answer your question?