Security Policy


The purpose of this Information Security Policy ("Policy") is to describe Accorp Partner Company's security policy regarding customer information, including how we secure their confidential information in our services.

Specifically, this Policy is intended to identify Accorpartner’s policies, procedures, and auditing and training practices utilized for Information Security, data security, and our resulting responsibilities to protect client’s confidential information from loss, misuse, unauthorized access, disclosure, alteration and destruction.

Personal Information

Accorp provides its customers with Auditing services and GDPR compliance services. In this capacity, we do not own or control any of the information we access on behalf of our customers; all such information is owned and controlled by our customers. This customer information is stored in a secure facility of a third-party independent data processor service provider on hardened systems using industry standard data security methods. Access to this information is restricted to authorized personnel only as dictated by operational policies. This information may be stored on Accorp's internal computer network or in offline filing systems. Access to this information is restricted to authorized personnel only as dictated by operational policies.

Approach to Security

The following sections describe Accrorp's comprehensive approach to ensuring enterprise-wide compliance with its Policy. This consists of four (4) major areas: Security, Personnel security awareness, Audits and Contracts.


Security of data is the cornerstone of verifying confidentiality and privacy of data. Accorp Company maintains a rigorous security posture through focused methodology. It is founded on the implementation of best practices and security policies in five (5) major areas providing enterprise wide coverage including:

  1. Regulatory Controls
  2. Organizational Controls
  3. Service Provider Controls
  4. Standardized Process and Practices
  5. Business Partner Controls

Key policies in place that contribute to the verification and compliance with the Policy are:

  1. Awareness and Training
  2. Personnel Practices
  3. Administrative Roles and Responsibilities
  4. Computer, Email and Internet Use Policies
  5. Network and Telecommunications Security
  6. Incident Detection and Reporting
  7. Malicious Code Control (Antivirus)
  8. Portable Computers
  9. Logical and System Access
  10. Physical Access
  11. Firewall Management
  12. Auditing and Monitoring
  13. Data Classification, Confidentiality, Integrity and Availability
  14. Policy Compliance

Operational procedures demonstrating compliance with the Policy are:

  1. Change Control
  2. Event monitoring
  3. Data backup
  4. System hardening

The above referenced policies and procedures are documented and available for review.

Our Personnel

Our personnel consist of employees and contractors.

Personnel Security Awareness training

Accorp regularly notifies and reinforces its Security Policy with its personnel. This is done using the following process:

  1. The Security Policies are distributed company-wide via email annually and when updated.
  2. At least once per year, the this Security Policy is presented and discussed at a company- wide meeting.
  3. This Security Policy is prominently displayed in a common area of the office.


This Security Policy is self-verified periodically by Accorp's Security Officer. The Security Officer is responsible for:

  1. Ensuring that the policies, guidelines, internal procedures, personnel training, and other measures necessary to implement the Policy are developed and put into practice,
  2. Working with Accorp's legal counsel to ensure Accorp’s ongoing compliance with applicable security laws and agreements, as well as any of Accorp’s other related legal obligations, and
  3. Overseeing annual assessments of Accorp's internal and external practices to ensure that they confirm to the Policy and related company obligations.

In addition, Accorp Company, through its internal audit processes, conducts an audit of its security controls a minimum of once per year. This independent review assesses the physical security, network security and operational policies and controls in place to protect customer data. The latest copy of the security review is available to customers, personnel and prospects upon request.