Last Updated: June 10, 2025
This policy establishes security standards to protect Technology Media'sdata, systems, networks, and personnel from internal and external threats. It ensures compliance with GDPR, CCPA (if applicable), and industry best practices.
Applies to:
• All employees, contractors, vendors, and third parties with access to Technology Media systems.
• Company-owned and BYOD devices (if permitted) used for work.
• Physical and cloud-based assets (servers, SaaS tools, databases).
Follow security protocols, report incidents, use strong passwords.
Implement firewalls, encryption, access controls, and monitor threats.
Allocate security budgets, enforce compliance, approve access.
Oversee GDPR/CCPA compliance (if applicable).
Examples: PII, trade secrets, financial data
Protection Required: Encryption, strict access controls
Examples: HR policies, internal reports
Protection Required: Role-based access
Examples: Marketing materials, press releases
Protection Required: No restrictions
Retain only as long as necessary (e.g., employee records = 7 years post-termination).
Securely delete/destroy expired data (e.g., shredding, cryptographic erasure).
Grant minimal access needed.
Required for remote access, admin accounts.
12+ chars, mix of upper/lowercase, numbers, symbols. Change every 90 days.
Immediate revocation of access upon exit.
Mandatory for all networks and sensitive data.
Required for remote work.
Regular OS/software updates.
MDM enrollment, remote wipe capability.
Email security@technologymedia.com or call +91 9823662453.
Isolate affected systems.
Root-cause analysis within 72 hours.
Inform affected parties/regulators if legally required (e.g., GDPR 72-hour rule).
Keycards/biometrics for server rooms.
Lock away confidential documents.
Shred documents, degauss/destroy old hard drives.
Annual Training: Cybersecurity best practices.
Phishing Tests: Quarterly simulated attacks.
Acknowledgment: Employees must sign compliance forms.
Annual Security Audit: Penetration testing, vulnerability scans.
Vendor Assessments: Third parties must meet Technology Media's security standards.
Regulatory Fines: Non-compliance may result in penalties under GDPR/CCPA.
Minor Breach: Retraining.
Major Breach: Suspension/termination + legal action.
Exceptions: Require CISO/DPO approval.
Version Control: Document all changes (e.g., "v2.0 – June 2025").