Ours Privacy

Trust Center

Welcome to Ours Privacy's Trust Center

At Ours Privacy, we understand the importance of security, privacy, compliance and transparency. That's why we take a comprehensive approach to Trust.

Whether you are a customer, prospective customer or partner, this self-serve tool enables you to complete your audits and security questionnaires. We are dedicated to consistently enhancing our Trust Center and will regularly update and review it.

Privacy PolicyPrivacy Policy

Compliance overview

Current compliance status across frameworks

Compliance Program

An overview of security controls in place

Access Control and Authorization

Access granting process used

Access management policy established

Account inventory maintained

Dormant accounts disabled

Employee access regularly reviewed

MFA required for critical services

Password management policy enforced

Password management policy established

Data Management and Protection

Data encrypted at rest

Data encrypted in-transit

Data inventory maintained

Data management and retention policy established

Disaster Recovery

Automated backups enabled

Business continuity and disaster recovery policy established

Data recovery process established

Disaster recovery plans tested

Recovery data isolated

Email Security

DMARC policy and verification used

Email account access restricted

Email settings block malicious content

Endpoint Security

Anti-malware deployed on end-user devices

Data encrypted on end-user devices

Firewall maintained on end-user devices

Mobile device management (MDM) used

Infrastructure Security

Active discovery tools used

Automated security scanning performed on infrastructure

Buckets not exposed publicly

Configuration management system established

Firewall restricts public access to infrastructure

Infrastructure changes logged

Infrastructure changes require review

Infrastructure deployed using an infrastructure-as-code tool

Production deployment access restricted

Unauthorized assets addressed and removed

Unique production database authentication enforced

Web Application Firewall (WAF) used

Monitoring and Incident Response

Audit log management process maintained

Audit logs collected

Incident response policy established

Infrastructure performance monitored

Log management used

Network infrastructure monitored

Organizational Security

Acceptable use policy established

Asset inventory maintained

Asset management policy established

Code of conduct established

Company commitments externally communicated

Confidentiality Agreement acknowledged by employees

Data-flow diagrams maintained

Employee background checks performed

External support resources available (i.e., documentation)

Offboarding process established

Onboarding process established

Performance evaluations conducted

Physical access restricted

Policies signed by relevant personnel

Reference checks performed for employees

Roles and responsibilities specified

Security awareness training conducted

Service description communicated

Software development lifecycle established

System changes externally communicated

System changes internally communicated

Risk Management

Risk assessments performed

Risk management policy established

Vendor inventory maintained

Vendor management program established

Vulnerability Management

Automated software patch management performed

Penetration testing findings remediated

Penetration testing performed

Vulnerabilities remediated

Vulnerabilities scanned

Vulnerability management policy acknowledged by employees

Vulnerability management policy established