Security and compliance

At TransNexus, we take security seriously. We follow best practices in our policies, procedures and technology to provide reliable systems that safeguard your information. Our compliance certifications reflect our conformance with standards and regulations for privacy and security policies and procedures.

Privacy

Our privacy policy is the cornerstone of our security and compliance program. TransNexus values and respects your right to privacy, and so we develop and maintain strong security practices to protect your information regardless of where it’s held.

Security

TransNexus has developed security policies and procedures to protect your privacy and ensure the reliability of our software products. Our security program includes:

  • Change management processes for acquiring new software or changing IT infrastructure
  • Datacenter security policies to safeguard information and software held there
  • Business continuity plans to mitigate the effects of unexpected disruptions
  • Supply chain management procedures to enable timely, effective communications with suppliers, partners and customers in response to an incident
  • Data security and information lifecycle policies to safeguard information, regardless of where it’s held, and dispose of it safely when no longer needed
  • Encryption and key management policies to ensure consistent, effective use of secure technology to safeguard information and systems
  • Governance and risk management policies to periodically review and update security policies and ensure consistent compliance
  • Human resources policies to train employees on security policies and periodically test knowledge and compliance
  • Device policies to regulate proper use of computers, tablets, phones and related devices
  • Identity and access management policies to establish and maintain controls around permissions and access to systems and information
  • Security incident response plan to handle security incidents quickly and effectively.

Compliance certifications, regulations and standards

We use third-parties to review our privacy and security policies and procedures and certify that they conform to best-practice standards. These certifications, regulations and standards include: