All Collections
Security & Privacy
In-depth documentation on what Speak AI does to secure your data.
What Does Speak Do For Security?How does Speak protect data, ensure confidentiality, encrypt information, select server locations and more.
Information Security Program Policy
Incident Reporting and Response Policy
Access Management PolicyEstablishes guidelines and procedures for managing access to Speak Ai Inc.'s ("Speak Ai") information systems and data.
Network Security Policy
Third-Party Security Policy
Human Resource Policy
Password Policy
Encryption Policy
Service Continuity Policy / Business Continuity Policy
Change Management Policy
Log Management Policy
Vulnerability Management Policy
Physical Security Policy
Asset Management PolicyThis policy establishes guidelines for the effective management and security of Speak Ai Inc.'s ("Speak Ai") physical and digital assets.
Data Classification Policy
Business Continuity PlanThis policy outlines the process and frequency for testing Speak AI’s Business Continuity Plan (BCP).
Disaster Recovery PlanThe frequency and procedures for testing Speak AI’s Disaster Recovery (DR) Plan to ensure that Speak AI can recover critical IT services.
Information Classification PolicyThe purpose of this policy is to establish a framework for classifying and protecting information assets at Speak AI Inc.
Pandemic & Infectious Disease Risk Management PlanSpeak AI's plans for pandemics or infectious disease outbreaks to ensure business continuity, protect employee health, and maintain service.
Environmental, Social, and Corporate Governance (ESG) PolicySpeak AI's ESG Policy outlines commitments to sustainability, social responsibility, diversity, ethics, and strong governance practices.
The Anti-Bribery and Anti-Corruption PolicyEstablishes guidelines to ensure compliance with anti-bribery laws and regulations, preventing unethical business and a culture of honesty.
Anti-Trust & Anti-Competitive Business Practices PolicyDefines policies to prevent anti-competitive behavior, including price-fixing, monopolistic practices, and unfair competition strategies.
Internal Compliance & Ethics ProgramProvides guidance on internal compliance expectations, ethical behavior, and mechanisms for reporting violations.
Ethical Sourcing PolicyDefines responsible procurement practices, ensuring that suppliers follow ethical labor, environmental, and governance standards.
Fraud Detection & Prevention PolicyCovers internal and external fraud risks, prevention measures, detection methods, and incident response procedures.
Records Retention PolicyEstablishes retention schedules for electronic and paper records, including compliance with legal, regulatory, and contractual requirements.
Modern Slavery & Human Trafficking Prevention PolicyOutlines measures to prevent forced labor and human trafficking within business operations and supply chains.
Health & Safety Compliance PolicyDefines workplace health and safety measures, including hazard prevention, emergency response, and regulatory compliance.
Network Device Hardening StandardsDefines security configurations for network devices including patching, password management, and access control.
Remote Network Access PolicyDetails secure remote access requirements, including VPN use, encryption, multi-factor authentication (MFA), and monitoring controls.
Encrypted Communications PolicyRequires encryption for all remote network connections, ensuring data protection in transit and preventing unauthorized access.
DMZ Security PolicySecurity requirements for a demilitarized zone (DMZ) environment, including access restrictions, segmentation, and monitoring controls.
Wireless Security PolicyEstablishes security guidelines for Wi-Fi networks, including authentication requirements, encryption standards, and access controls.
Third-Party Data Privacy PolicyDefines privacy obligations for third-party vendors, including limitations on data use, disclosure, and compliance with privacy laws.
Cloud Hosting Compliance & Audit PolicyEstablishes audit requirements for cloud hosting providers, including security assessments, obligations, and compliance validation.
Acceptable Use PolicyDefines acceptable use of information and assets, ensuring proper handling and security practices.
Internet of Things (IoT) Security PolicyCovers security standards for IoT devices connected to Speak AI's infrastructure.
Network Segmentation & Segregation PolicyDefines security practices for isolating networks and blocking unauthorized traffic.
Collaborative Computing PolicyAddresses security for tools like video conferencing, virtual whiteboards, and shared collaboration platforms.
Sanctions Compliance PolicyEnsures compliance with international sanctions and country-blocking measures.
Offsite Backup & Storage PolicyThe purpose of this policy is to define the backup and offsite storage procedures for Speak AI Inc.