This IT security policy establishes guidelines and procedures for safeguarding Alluvium’s (also referred to as “The Organization'') information assets and IT infrastructure from unauthorized access, misuse, and security threats. Data, electronic file content, information systems, and computer systems at Alluvium must be managed as valuable organization resources.
This policy applies to the use of information, electronic and computing devices, and network resources to conduct business or interact with internal networks and business systems, whether owned or leased by The Organization, the employee, or a third party.
All employees, volunteer, directors, contractors, consultants, temporaries, other workers at the Organization and all third parties who have access or make use of the organization’s information system are responsible for exercising good judgment regarding appropriate use of information, electronic devices, and network resources in accordance with this policy, local laws, and regulations
All electronic files created, sent, received, or stored on the organization owned, leased, or administered equipment or otherwise under the custody and control of the organization are the property of the organization
All electronic files created, sent, received, or stored on the organization owned, leased, or administered equipment or otherwise under the custody and control of the organization are not private and may be accessed by the organization's IT employees at any time without knowledge of the user, sender, recipient, or owner subject to the approval of management.
Electronic file content may also be accessed by appropriate personnel in accordance with directives from Human Resources or the management.
- Use SSL/TLS to communicate with AWS resources.
- Set up API and user activity logging with AWS CloudTrail.
- Use AWS encryption solutions, along with all default security controls within AWS services.
and copying of files or clipboards in or out of the VDIs is not allowed.
All mobile and computing devices issued by the Company are connected to the internal network and must comply with this policy.
System level and user level passwords must comply with the Password Policy. Authorized users must not share their Alluvium login ID(s), account(s), passwords, Personal Identification Numbers (PIN), Security Tokens (i.e. Smartcard), or similar information or devices used for identification and authentication purposes. Mobile phones for 2FA are also issued by the Organization which is controlled as needed.
SyProviding access to another individual, either deliberately or through failure to secure its access, is prohibited.
Authorized users may access, use, or share the Organization’s proprietary information only to the extent it is authorized and necessary to fulfill the users assigned job duties.
All PCs, laptops, and workstations should be secured with a password-protected screensaver with the automatic activation feature set at 10 minutes or less.
All users must lockdown their PCs, laptops, and workstations by locking when the host will be unattended for any amount of time. Employees must log-off, or restart their PC after their shift.
All users are responsible for promptly reporting the theft, loss, or unauthorized disclosure of Alluvium’s PCs, laptops, other equipment and proprietary information to their immediate supervisor and/or the IT Department.
All users must report damage to the Product team and All users must note that the Company is not liable to repair all damages. The Organization will exercise their discretion to decide what kind of damages the Organization will be responsible for and which damages the Users will be responsible for.
Authorized users must use extreme caution when opening e-mail attachments received from unknown senders, which may contain viruses, e-mail bombs, or Trojan Horse codes.
Users must not intentionally access, create, store, or transmit material which The Organization may deem to be offensive, indecent, or obscene.
Under no circumstances is an employee, volunteer, director, contractor, consultant, or temporary employee of The Organization authorized to engage in any activity that is illegal under local, state, federal, or international law while utilizing The Organization’s owned resources.
Under no circumstances is an employee, volunteer, director, contractor, consultant, or temporary employee of The Organization authorized to engage in any activity that is illegal under local, state, federal, or international law while utilizing The Organization’s owned resources.
Access to the Internet at home, from an Alluvium owned computer, must adhere to all the same policies that apply to use from within The Organization facilities. Authorized users must not allow family members or other non-authorized users to access The Organization’s computer systems.
The Organization’s information systems must not be used for personal benefit.
The IT Department shall carry out regular vulnerability assessment and utilize patch management, threat protection and scheduled monitoring to identify, assess, mitigate and protect against threats, viruses and malicious code.
The IT Department shall ensure that the Organization uses up to date reputable anti virus checking software tools to check the Systems and to scan all email attachments before they are opened and shall implement network security controls, intrusion detection systems to limit the scope of any attack.
This Policy shall be reviewed annually and be approved by the management to ensure its effectiveness and relevance to the Organization’s security objectives.
The IT department will Evaluate exception requests based on business justifications and risk assessments.
The IT department will Obtain approval from appropriate management and IT security stakeholders for policy exceptions.
Non- Compliance with this policy may result in disciplinary action up to the termination of employment or legal action, depending on the severity of the violation and its impact on the Organization’s security posture.
Have questions or need assistance? We're here to
help. Reach out to us for support, inquiries, or
feedback, and our team will get back to you promptly.
Have questions or need assistance? We're here to help. Reach out to us for support, inquiries, or feedback, and our team will get back to you promptly.
Need a quick chat? Skip the form and book a time that works for you.