AI Policy » Data Security

ETHORITY » Data Security Policy

ETHORITY & STEN.AI LLC
San Francisco, CA 94111, USA

Page Structure:

  1. Introduction
  2. Scope and Objectives
  3. Data Protection Principles
  4. Security Measures
  5. Access Control
  6. Incident Response
  7. Employee Responsibilities
  8. Third-Party Security
  9. Regular Audits and Reviews
  10. Contact Information

1. Introduction

At ETHORITY, the security of your data is our top priority. We are committed to safeguarding the data entrusted to us by implementing robust security measures and best practices. This Data Security Policy outlines the principles and procedures we follow to protect the confidentiality, integrity, and availability of data.


2. Scope and Objectives

Scope: This policy applies to all employees, contractors, and third-party service providers who handle data on behalf of ETHORITY.

Objectives:

  • Protect data from unauthorized access, disclosure, alteration, and destruction.
  • Ensure compliance with applicable data protection laws and regulations.
  • Promote a culture of security awareness and responsibility.

3. Data Protection Principles

We adhere to the following data protection principles:

  • Confidentiality: Ensuring that data is accessible only to those authorized to access it.
  • Integrity: Protecting data from being altered or tampered with by unauthorized parties.
  • Availability: Ensuring that data is available to authorized users when needed.

4. Security Measures

To protect data, ETHORITY implements the following security measures:

  • Encryption: Data is encrypted both in transit and at rest to protect it from unauthorized access.
  • Firewalls and Intrusion Detection Systems: These systems are used to monitor and block unauthorized access to our networks.
  • Secure Passwords: All passwords must meet complexity requirements and be changed regularly.
  • Two-Factor Authentication (2FA): 2FA is required for accessing sensitive systems and data.

5. Access Control

Access to data is controlled through the following mechanisms:

  • Role-Based Access Control (RBAC): Access to data is granted based on the user’s role and responsibilities.
  • Least Privilege Principle: Users are granted the minimum level of access necessary to perform their job functions.
  • Regular Access Reviews: Access rights are reviewed regularly to ensure they are still appropriate.

6. Incident Response

ETHORITY has a comprehensive incident response plan to address data security incidents:

  • Incident Detection: Systems are in place to detect and alert on potential security incidents.
  • Incident Reporting: Employees must report any suspected data security incidents immediately.
  • Incident Response Team: A dedicated team is responsible for investigating and responding to security incidents.
  • Mitigation and Recovery: Steps are taken to mitigate the impact of the incident and restore normal operations as quickly as possible.
  • Post-Incident Review: A thorough review is conducted after an incident to identify root causes and implement improvements.

7. Employee Responsibilities

All employees play a role in ensuring data security:

  • Security Awareness Training: Employees receive regular training on data security best practices and policies.
  • Reporting: Employees must report any security vulnerabilities or incidents promptly.
  • Compliance: Employees must adhere to all data security policies and procedures.

8. Third-Party Security

ETHORITY ensures that third-party service providers adhere to our data security standards:

  • Due Diligence: We conduct thorough due diligence before engaging with third-party service providers.
  • Contracts: Contracts with third parties include data security requirements and responsibilities.
  • Monitoring: We regularly monitor and assess the security practices of third-party service providers.

9. Regular Audits and Reviews

ETHORITY conducts regular audits and reviews to ensure ongoing compliance with data security policies:

  • Internal Audits: Regular internal audits are conducted to assess compliance with data security policies.
  • External Audits: External audits are performed periodically by independent parties to verify our security practices.
  • Continuous Improvement: Findings from audits and reviews are used to improve our data security practices continuously.

10. Contact Information

If you have any questions or concerns about our Data Security Policy, please contact us:

ETHORITY & STEN.AI LLC
Email: security@ethority.net
Phone: 1-415-800-3969
Address: 1160 Battery St E Ste 100, San Francisco, CA 94111, USA

Contact us

Empower Your Business with ETHORITY's AI Expertise

At ETHORITY, we are your strategic partner for AI success. Our “All-In-On-AI” consultancy model is built on a strong ethical foundation, ensuring your business leads the way in AI adoption and digital strategy.

Our Core Offerings:

  • AI Consultancy: Strategy, Roadmap, Infrastructure
  • AI Education: Master Classes & Custom Workshops
  • GenAI Products: ANUNNAKI AI Family (10 LLMs)
  • Ethical AI: Governance & Certifications
  • AI Business Frameworks: Tailored Solutions & Strategy
  • Research & Partnerships: Collaborations for Innovation
  • AI for NGOs & Public Sector: Sustainable Development Goals
Engagement Process:
1

Schedule a call at your convenience.

2

Participate in a video call to discuss your needs.

3

Receive a customized proposal tailored to your objectives.

Schedule a Free Consultation