Proxymity

Governance and Frameworks

  • Define an operating model and clear roles and responsibilities for risk management, addressing Proxymity’s administrative, physical, and technical controls to protect the security, confidentiality, and integrity of customer data
  • Engage an independent external auditor to conduct annual reviews of Proxymity’s security practices against recognised audit standards, such as SOC 2 (Type II)
  • Establish compliance policies and procedures designed to ensure applicable statutory, regulatory, and contractual requirements are adhered to across Proxymity
  • Create information security policies, approved by management, published and accessible to all Proxymity employees
  • Review and update policies at planned intervals to maintain their ongoing relevance, adequacy, and effectiveness
  • Require all Proxymity employees undergo information security and privacy awareness training at time of hire and on an annual basis thereafter
  • Perform employee background screening of all new Proxymity employees prior to onboarding, in accordance with industry standards and best practices
  • Establish senior governance forums for the regular review of Proxymity’s enterprise risk profile, including reporting on key security control activities, established Key Risk Indicators (KRI) and incorporating appropriate external threat intelligence

Stay in touch

Stay updated with the latest trends. Sign up for our newsletter.