Security Policy

Introduction

Stable Works LLC (“we,” “our,” “us”) is committed to ensuring the security of our clients’ information and our systems. This Security Policy outlines the measures we take to protect data, prevent unauthorized access, and maintain the integrity of our services.

Information Security

Data Protection

We employ various security measures to protect your personal information, including:

  • Encryption: Sensitive data, including payment information, is encrypted during transmission using secure socket layer (SSL) technology.
  • Access Controls: Access to personal information is restricted to authorized personnel who need the information to perform their job duties.
  • Data Storage: Personal information is stored on secure servers protected by firewalls and other advanced security technologies.

Network Security

Our network is protected by robust security measures to prevent unauthorized access, including:

  • Firewalls: We use firewalls to protect our internal network from unauthorized access.
  • Intrusion Detection Systems (IDS): We deploy IDS to monitor and detect potential security breaches.
  • Regular Security Audits: We conduct regular security audits and vulnerability assessments to identify and address potential threats.

Physical Security

Our physical premises are secured to prevent unauthorized access to our systems, including:

  • Controlled Access: Access to our office and data centers is restricted to authorized personnel through the use of access control systems.
  • Surveillance: We use video surveillance to monitor our facilities and detect unauthorized activities.
  • Secure Disposal: We ensure that any physical documents containing personal information are securely disposed of through shredding or other means.

Employee Training

We recognize that our employees play a crucial role in maintaining security. Therefore, we implement the following measures:

  • Security Awareness Training: All employees receive regular training on security best practices, data protection, and how to identify and respond to potential security threats.
  • Confidentiality Agreements: Employees are required to sign confidentiality agreements to protect client information and company data.

Incident Response

In the event of a security breach, we have a comprehensive incident response plan in place to:

  • Identify and Contain: Quickly identify the breach and take steps to contain the incident to prevent further damage.
  • Assess Impact: Evaluate the extent of the breach and the potential impact on affected parties.
  • Notify Affected Parties: Inform affected individuals and regulatory authorities as required by law.
  • Remediate: Take corrective actions to address the root cause of the breach and prevent future incidents.
  • Review and Improve: Conduct a post-incident review to improve our security measures and incident response protocols.

Third-Party Security

We ensure that any third-party service providers we work with adhere to strict security standards by:

  • Due Diligence: Conducting thorough due diligence before engaging with third-party vendors to ensure they meet our security requirements.
  • Contracts and Agreements: Including security and confidentiality clauses in contracts with third-party service providers.
  • Regular Audits: Periodically auditing third-party vendors to ensure ongoing compliance with our security policies.

Compliance

We comply with all relevant data protection and privacy regulations, including:

  • General Data Protection Regulation (GDPR)
  • California Consumer Privacy Act (CCPA)
  • Other applicable state and federal laws

Policy Review

We review and update this Security Policy regularly to ensure it remains effective and aligned with industry best practices and regulatory requirements.

Contact Us

If you have any questions or concerns about our Security Policy, please contact us at:

Stable Works LLC
218 Richwood Rd,
Monroeville, NJ 08343
Phone: 856-242-1930
Email: [email protected]