Data privacy and compliance are very important to the BW Events Tech team. Check out below to learn more about our policies, regulations and certifications.
BW Events is committed to maintaining compliance with industry standards and regulations. Currently, we are in the process of obtaining certifications for ISO 27001 and SOC 2 with the partnership and support of Align, a leading compliance solutions provider. These certifications demonstrate our dedication to upholding the highest standards of data security and compliance.
BW Events takes data security seriously and employs industry-standard encryption protocols to protect all data collected through our platform. Data is encrypted both during transmission and at rest, ensuring comprehensive security measures.
We implement stringent access controls, including role-based permissions and multi-factor authentication, to limit access to your data only to authorized personnel. Additionally, we encrypt data at rest to prevent unauthorized access to stored information.
Yes, your data is stored on highly secure servers hosted by trusted third-party providers. These servers adhere to the highest standards of security protocols to prevent data breaches or unauthorized access. Furthermore, all stored data is encrypted to ensure its security while at rest.
Access Control Policy
Access Review Policy – Applications and Environment
Business Continuity Plan
Change Management Policy
Clear Desk and Clear Screen Policy
Comprehensive Risk Managment
Confidential Data Policy
Data Destruction Policy
Disaster Recovery Plan
Incident Management Policy
Information Security Management System Policy
SDLC Policy
Vulnerability Scan Policy
Fraud Assessment
Control
Status
Ensure the accuracy and reliability of financial reporting
Control
Status
Safeguard information systems and data integrity.
Enforce strict access controls for critical systems, ensuring that only authorized personnel have access.
Control
Status
Ensure accurate tracking and valuation of inventory.
Implement an inventory management system to track real-time stock levels and facilitate accurate reporting.
Conduct regular physical counts of inventory to compare against recorded levels.
Control
Status
Ensure compliance with procurement policies and mitigate vendor-related risks.
Control
Status
Ensure compliance with HR policies and protect sensitive employee information.
Control
Status
Ensure adherence to relevant laws, regulations, and industry standards.
Provide regular training sessions to keep employees informed about compliance requirements.
Control
Status
Protect customer and employee data from unauthorized access and ensure compliance with privacy regulations.
Conduct assessments to identify and rectify potential vulnerabilities in data handling processes.
Control
Status
Assess and monitor the overall effectiveness of internal controls.
Conduct periodic internal audits to review the implementation and effectiveness of controls.
Regularly review and update the Internal Control Matrix based on audit findings and changes in the business environment
Amazon Web Services • Cloud hosting
Github
Heroku
MangoDB
Google Workspace
Trello
Salesforce
Slack
BW Events is committed to maintaining compliance with industry standards and regulations. Currently, we are in the process of obtaining certifications for ISO 27001 and SOC 2 with the partnership and support of Align, a leading compliance solutions provider. These certifications demonstrate our dedication to upholding the highest standards of data security and compliance.
BW Events takes data security seriously and employs industry-standard encryption protocols to protect all data collected through our platform. Data is encrypted both during transmission and at rest, ensuring comprehensive security measures.
We implement stringent access controls, including role-based permissions and multi-factor authentication, to limit access to your data only to authorized personnel. Additionally, we encrypt data at rest to prevent unauthorized access to stored information.
Yes, your data is stored on highly secure servers hosted by trusted third-party providers. These servers adhere to the highest standards of security protocols to prevent data breaches or unauthorized access. Furthermore, all stored data is encrypted to ensure its security while at rest.
BW Events does not share your data with any third parties unless explicitly authorized by you or required by law. We prioritize the confidentiality and privacy of your information and adhere to strict data protection policies, including encryption of data during transmission to third-party services.
We regularly backup data to multiple secure locations to mitigate the risk of data loss. Additionally, our systems are equipped with failover mechanisms to ensure continuous operation and minimize the impact of any potential disruptions. All backed-up data is encrypted to maintain its integrity and security.
BW Events is committed to compliance with applicable data protection laws, including but not limited to GDPR (General Data Protection Regulation) and CCPA (California Consumer Privacy Act). We provide tools and features to help our customers fulfill their obligations under these regulations, including encryption of data both in transit and at rest.
In the event of a suspected security incident or breach, please contact BW Events immediately through our dedicated support channels. We have procedures in place to investigate and respond promptly to any security concerns raised by our customers. All communication channels are secured with encryption to safeguard the information shared during such incidents.
Yes, you can request access to your data or submit a request for its deletion by contacting our support team. We will promptly assist you in fulfilling your data rights in accordance with applicable data protection laws. Any data provided to you or deleted from our systems is handled securely, with encryption protocols in place to protect its confidentiality.
We conduct regular security audits and assessments of our systems, infrastructure, and procedures to identify and address any potential vulnerabilities or weaknesses. These audits are performed by internal teams as well as third-party security experts to ensure comprehensive coverage. All audit processes and reports are handled with encryption to maintain the security of the information involved.
© 2024 BW Events Tech. All rights reserved
Take the next step in event tech!Â
Enter your info, we’ll contact you soon.