Happay recognises that the confidentiality, integrity and availability of information and data created, maintained and hosted by us are vital to the success of the business and privacy of our partners.
As a service provider/product, we understand the importance in providing clear information about our security practices, tools, resources and responsibilities within Happay so that our customers can feel confident in choosing us as a trusted provider.
This Security Posture highlights high-level details about our steps to identify and mitigate risks, implement best practices, and continuously develop ways to improve.
Founded in 2012
Here are the important security policies and documents which are a part of Happay’s compliance program.
Data Retention Policy
Policy
Vendor Management Policy
Policy
Incident Management Policy
Policy
Password Policy
Policy
Acceptable Usage Policy
Policy
Risk Management Policy
Policy
Physical Security Policy
Policy
Confidentiality Policy
Policy
Access Control Policy
Policy
Code of Business Conduct Policy
Policy
Change Management Policy
Policy
Data Backup Policy
Policy
Data Classification Policy
Policy
Information Security Policy
Policy
Media Disposal Policy
Policy
Vulnerability Management Policy
Policy
Business Continuity Policy
Policy
Disaster Recovery Policy
Policy
Encryption Policy
Policy
Endpoint Security Policy
Policy
Data Protection Policy
Policy
Cloud Security Policy
Policy
Network Security Policy
Policy
Asset Management
Policy
Antivirus
Policy
Patch Management
Policy
Back Ground Verification Policy
Policy
BYOD
Policy
Capacity Management
Policy
Competency
Policy
Configuration and Hardening
Policy
Internal Audit Procedure
Policy
ISMS Objectives
Policy
Log Management
Policy
Operating Procedures for IT
Policy
Privacy Policy_2022
Policy
Roles and Responsibilities
Policy
Scope_Of_ISMS
Policy
SDLC
Policy
Secure System Engineering Principles
Policy
Statement of Applicability
Policy
Privacy Incident and Breach Management Policy
Policy
Internal Privacy Policy
Policy
Network Diagram
Document
Privacy Policy
Document
Term Of Service
Document
Pentest Report
Document
DR Drill Report
Document
Self Declaration for malware free software
Document
Vulnerability Assessment Report
Document