CloudLIMS employs strict policies and procedures encompassing the security, availability, integrity, confidentiality, and privacy of user data.
Security Awareness
Our employees sign a confidentiality agreement on being onboarded. We train employees on specific aspects of security based on their roles. We educate our employees continually on information security, privacy, and compliance to keep them updated regarding the security practices of the organization. Furthermore, we periodically organize company events to explain to our employees the importance of security and privacy.
Internal Audit and Compliance
We have a dedicated compliance team to review procedures and policies in our company, align them with industry standards, and determine what controls, processes, and systems are needed to meet the standards. We conduct regular internal audits and also invite independent and third-party auditors to evaluate our procedures, policies, and operational standards.
Endpoint Security
All workstations issued to CloudLIMS employees run the latest OS version and are configured with anti-virus and antimalware software to secure them from external intrusions. All workstations are properly configured, patched, tracked, and monitored by CloudLIMS's endpoint management solutions so that they comply with our security standards. It also protects all the systems from external media and unauthorized data transfer.