Org Logo

Resources (62)

Here are the important security policies and documents which are a part of Security & Data Privacy for 1mind AI, Inc.’s compliance program.

Access Control Policy

policy

Access Control Procedure

policy

Acceptable Usage Policy

policy

Asset Management Policy

policy

Asset Management Procedure

policy

Backup Restoration Procedure

policy

Business Continuity & Disaster Recovery Policy

policy

Business Continuity Plan

policy

Code of Business Conduct Policy

policy

Communications & Network Security Policy

policy

Compliance Policy

policy

Compliance Procedure

policy

Corporate Generative AI (GenAI) Policy

policy

Cryptography and Key Management Policy

policy

Data Breach Notification Policy

policy

Data Classification Policy

policy

Data Protection Policy

policy

Data Retention Policy

policy

Encryption Policy

policy

Endpoint Security Policy

policy

Incident Management Policy

policy

Incident Management Procedure

policy

Information Security Policy

policy

HR Incident Management Policy

policy

HR Security Policy

policy

HR Security Procedure

policy

Media Disposal Policy

policy

Network Security Procedure

policy

Operation Security Policy

policy

Operations Security Procedure

policy

Organization of Information Security Policy

policy

Physical & Environmental Security Policy

policy

Physical and Environmental Security Procedure

policy

Privacy By Design Policy

policy

Risk Assessment & Management Policy

policy

SDLC Procedure

policy

System Acquisition and Development Lifecycle Policy

policy

System Description

policy

Vendor Management Policy

policy

Vendor Management Procedure

policy

Vulnerability Management Process

policy

SOC 2 Type 2 Report 2025

document

Acceptable Usage Guidelines

document

Acceptable Usage Policy Reporting

document

Accessibility Conformance Report

document

Accessibility Statement

document

AI Pentest Report

document

Consensus Assessment Initiative Questionnaire (CAIQ)

document

Disaster Recovery Exercise & Discussion

document

DPA

document

Data Privacy Framework

document

Ethical Stance

document

Network Diagram

document

Penetration Test Certificates

document

Pentest Report

document

Personal Information, Collection, and Usage Overview

document

Privacy and Data Access Request (DSAR)

document

Privacy Policy

document

Sub-processors List

document

Terms of Use

document

Transparency Report and Warrant Canary

document

Vendor Data Privacy and Data Request (DSAR)

document