Below are the key security policies and documents that form part of Sophus’s compliance program.

Policies (22)

Acceptable Usage Policy

Defines the appropriate use of Sophus systems, tools, equipment, and data to safeguard critical information.

Got questions?
infosec@sophus.ai

Access Control Policy

Ensures that access to Sophus assets is managed based on business and security requirements.

Got questions?
infosec@sophus.ai

Business Continuity Policy

Provides a framework to maintain operational continuity and facilitate recovery in case of disruptions.

Got questions?
infosec@sophus.ai

Change Management Policy

Establishes guidelines for implementing IT operational changes securely, efficiently, and with minimal risk.

Got questions?
infosec@sophus.ai

Code of Conduct Policy

Defines expected professional conduct to promote a respectful and collaborative workplace.

Got questions?
infosec@sophus.ai

Data Backup and Recovery Policy

Defines the procedures for securely backing up critical data and implementing recovery strategies to ensure data availability and integrity.

Got questions?
infosec@sophus.ai

Data Classification and Retention Policy

Outlines a structured approach for classifying data based on sensitivity and defining retention periods to comply with legal, regulatory, and business requirements.

Got questions?
infosec@sophus.ai

Encryption Policy

Establishes encryption requirements for data at rest and in transit to enhance security and compliance.

Got questions?
infosec@sophus.ai

Incident Management Policy

Defines processes for promptly detecting, reporting, assessing, and resolving security incidents to minimize impact and ensure timely remediation.

Got questions?
infosec@sophus.ai

Information Security Policy

Establishes guidelines for protecting Sophus information assets, ensuring confidentiality, integrity, and availability of data.

Got questions?
infosec@sophus.ai

Media Disposal Policy

Ensures secure disposal of electronic and physical media to prevent unauthorized data exposure and potential breaches.

Got questions?
infosec@sophus.ai

Password Policy

Establishes standards for password creation, management, and protection to enhance security and prevent unauthorized access.

Got questions?
infosec@sophus.ai

Physical Security Policy

Outlines measures to safeguard physical infrastructure, facilities, and workspace security to prevent unauthorized access.

Got questions?
infosec@sophus.ai

Risk Management Policy

Defines a structured approach for identifying, assessing, and managing risks that could impact Sophus business objectives and security posture.

Got questions?
infosec@sophus.ai

Vendor Management Policy

Establishes guidelines for evaluating, onboarding, and managing vendor relationships to ensure data security and compliance with regulatory requirements.

Got questions?
infosec@sophus.ai

Vulnerability and Patch Management Policy

Defines protocols for identifying, assessing, and mitigating security vulnerabilities through a structured patch management process.

Got questions?
infosec@sophus.ai

HR Security Policy

Defines security measures applicable throughout the employment lifecycle, from hiring to termination, to mitigate insider threats and ensure compliance.

Got questions?
infosec@sophus.ai

Data Breach Policy

Specifies protocols for timely identification, containment, reporting, and notification of data breaches to minimize risk and ensure compliance with regulatory requirements.

Got questions?
infosec@sophus.ai

Business Continuity Plan

Establishes procedures for maintaining organizational resilience and ensuring continued operations during prolonged service disruptions.

Got questions?
infosec@sophus.ai

Asset Management Policy

Outlines protocols for classifying, tracking, protecting, and managing Sophus assets throughout their lifecycle to prevent unauthorized access or loss.

Got questions?
infosec@sophus.ai

Compliance Policy

Ensures adherence to statutory, regulatory, and contractual compliance requirements, including security and privacy obligations.

Got questions?
infosec@sophus.ai

Software Development Lifecycle Policy

Defines security requirements and best practices for secure software development, acquisition, and maintenance to integrate security throughout the software lifecycle.

Got questions?
infosec@sophus.ai

Certifications & Reports (4)

ISO 27001 Certificate

ISO 27001 certification issued by an independent third-party auditor to demonstrate compliance with information security best practices.

Got questions?
infosec@sophus.ai

SOC 2 Reports

In Progress

Got questions?
infosec@sophus.ai

Vulnerability Assessment Report

Provides insights into security vulnerabilities identified during periodic assessments and recommended remediation steps.

Got questions?
infosec@sophus.ai

Pentest Report

Documents the findings of penetration testing exercises and recommended mitigation measures.

Got questions?
infosec@sophus.ai

Technical Documentation (2)

Network Diagram

Refer to the attached network architecture document for an overview of network design, security controls, and segmentation.

Got questions?
infosec@sophus.ai

Product Architecture

Documents the high-level system design, data flow, and security measures incorporated into Sophus products to ensure security and compliance.

Got questions?
infosec@sophus.ai

Privacy Policy

Refer to the Privacy Policy available online for details on how Sophus manages and protects user data.