Security at ¾ÅÉ«ÊÓÆµ
At ¾ÅÉ«ÊÓÆµ, we recognize the paramount importance of information security to our valued customers. As a global organization, we have wholeheartedly embraced the ISO 27001 framework to establish a robust structure for our Information Security Management System (ISMS).Ìý
Why ISO 27001 MattersÌý
- Widely Accepted and Industry Recognized: The ISO 27001 framework is universally acknowledged and respected. By adopting it, ¾ÅÉ«ÊÓÆµ ensures a solid foundation to meet our customers’ stringent security requirements.Ìý
- Certification Achievement: Our commitment to excellence has led us to achieve ISO 27001:2013 certification across many of our products, services, and supporting functions. This certification underscores our dedication to safeguarding information. For specifics about our certification scope, please refer to our current ISO 27001 certificate.Ìý
Our High-Level Information Security PoliciesÌý
On this page, we've added some of our high-level information security policies alongside product-specific security documentation. These policies guide our actions and reinforce our commitment to maintaining a secure environment.Ìý
Contact UsÌý
Whether you have specific needs, concerns, or questions related to security, we’re here to assist you. Below, you’ll find relevant contact information:Ìý
- For account-related requests such as account deletion, please contact global.supply@rws.com.Ìý
- For technical support issues, please follow the guidance at the following link: ¾ÅÉ«ÊÓÆµ Technical supportÌý
- If you have discovered a security vulnerability and would like to ethically disclose this, please report it to us via security.reporting@rws.com. Please note that ¾ÅÉ«ÊÓÆµ does not currently have a bug bounty program.Ìý
- For personal data subject requests in accordance with the ¾ÅÉ«ÊÓÆµ Privacy Notice, please contact us at privacy@rws.com.
If you are an ¾ÅÉ«ÊÓÆµ employee and require operational support such as with sign-in issues, please use the IT service desk.
FAQs
Please describe your initial selection and risk assessment process for suppliers/ vendors.
Does ¾ÅÉ«ÊÓÆµ have a Supplier management program for security?
Describe how you identify and manage the information security vulnerabilities in your IT systems, including change management processes.
Describe how you secure applications through the system development lifecycle including how you develop and test changes to applications.
Do you use a tool to track incidents, changes and problems?
Does ¾ÅÉ«ÊÓÆµ have an Acceptable Use Policy?
What is the retention policy for customer data?
Is there an Asset Management process?
Is there a Patch Management process?
Is there a Change Management process?
Has ¾ÅÉ«ÊÓÆµ implemented a formalized approval process for logical access requests based on the principles of least privilege?
Is there a risk assessment program that has been approved by management, communicated to relevant employees and an owner appointed to maintain the program?
Describe the key elements of the ¾ÅÉ«ÊÓÆµ security risk management program
Does ¾ÅÉ«ÊÓÆµ consider Data Privacy?
Does ¾ÅÉ«ÊÓÆµ have ISO 27001 certification?
Does ¾ÅÉ«ÊÓÆµ have SOC 2 type II attestation
Is an established, published, and annually approved security program in place?
Does ¾ÅÉ«ÊÓÆµ have a dedicated information security owner and/or team responsible for information security?
Is there an information security policy which has been approved by management, communicated to all personnell?
Please list your information security policies. Are such policies reviewed and updated regularly, and accessible to all ¾ÅÉ«ÊÓÆµ personnel?
Our policies are reviewed at least annually. Internal documents may be viewed on site or remotely viewed by the client during an audit under NDA / MNDA.Ìý
¾ÅÉ«ÊÓÆµ Group ISMS Information Security Policy
¾ÅÉ«ÊÓÆµ Group Information Security Policy
¾ÅÉ«ÊÓÆµ Group Security Risk Management Policy (Internal)
¾ÅÉ«ÊÓÆµ Group Security Testing Policy (Internal)
¾ÅÉ«ÊÓÆµ Group Logical Access Policy (Internal)
¾ÅÉ«ÊÓÆµ Group Business Continuity Policy (Internal)
¾ÅÉ«ÊÓÆµ Group Global Classification & Handling Policy (Internal)
¾ÅÉ«ÊÓÆµ Group Information Security Incident Management Policy (Internal)
¾ÅÉ«ÊÓÆµ Group Physical Security Policy (Internal)
¾ÅÉ«ÊÓÆµ Group Privacy Policy (Internal)
¾ÅÉ«ÊÓÆµ Group IT System Policy (Internal)
¾ÅÉ«ÊÓÆµ Group Cryptographic Controls Policy (Internal)
¾ÅÉ«ÊÓÆµ Group Supplier Security Management Policy (Internal)
¾ÅÉ«ÊÓÆµ Group Secure Software Development Policy (Internal)
¾ÅÉ«ÊÓÆµ Group ISMS Acceptable Use Policy (Internal)
¾ÅÉ«ÊÓÆµ Group ISMS Security Exceptions Policy (Internal)Ìý
Our policies are published on the corporate Intranet and available to all ¾ÅÉ«ÊÓÆµ employees, policies are regularly communicated to ¾ÅÉ«ÊÓÆµ employees via mandatory security & privacy awareness and training.