HaileyAI Trust Center

Infrastructure security

ControlStatus
Encryption key access restricted
The company restricts privileged access to encryption keys to authorized users with a business need.
Unique account authentication enforced
The company requires authentication to systems and applications to use unique username and password or authorized Secure Socket Shell (SSH) keys.
Production application access restricted
System access restricted to authorized access only.
Access control procedures established
The company’s access control policy documents the requirements for the following access control functions:
  • adding new users;
  • modifying users; and/or
  • removing an existing user’s access.
Firewall access restricted
The company restricts privileged access to the firewall to authorized users with a business need.
Access revoked upon termination
The company completes termination checklists to ensure that access is revoked for terminated employees within SLAs.
Unique network system authentication enforced
The company requires authentication to the “production network” to use unique usernames and passwords or authorized Secure Socket Shell (SSH) keys.
Remote access MFA enforced
The company’s production systems can only be remotely accessed by authorized employees possessing a valid multi-factor authentication (MFA) method.
Remote access encrypted enforced
The company’s production systems can only be remotely accessed by authorized employees via an approved encrypted connection.
Intrusion detection system utilized
The company uses an intrusion detection system to provide continuous monitoring of the company’s network and early detection of potential security breaches.
Firewall rules configured
The company uses firewalls and configures them to prevent unauthorized access.
Network segmentation implemented
The company separates production and non-production environments through network segmentation controls.
Infrastructure access logged
The company logs and monitors all access to cloud infrastructure and production systems.
Critical patches applied timely
The company applies critical security patches and updates to production systems in a timely manner in accordance with established SLAs.

Organizational security

ControlStatus
Asset disposal procedures utilized
The company has electronic media containing confidential information purged or destroyed in accordance with best practices, and certificates of destruction are issued for each device destroyed.
Production inventory maintained
The company maintains a formal inventory of production system assets.
Portable media encrypted
The company encrypts portable and removable media devices when used.
Anti-malware technology utilized
The company deploys anti-malware technology to environments commonly susceptible to malicious attacks and configures this to be updated routinely, logged, and installed on all relevant systems.
Employee background checks performed
The company performs background checks on new employees.
Code of Conduct acknowledged by contractors
The company requires contractor agreements to include a code of conduct or reference to the company code of conduct.
Code of Conduct acknowledged by employees and enforced
The company requires employees to acknowledge a code of conduct at the time of hire. Employees who violate the code of conduct are subject to disciplinary actions in accordance with a disciplinary policy.
Confidentiality Agreement acknowledged by contractors
The company requires contractors to sign a confidentiality agreement at the time of engagement.
Confidentiality Agreement acknowledged by employees
The company requires employees to sign a confidentiality agreement during onboarding.
Performance evaluations conducted
The company managers are required to complete performance evaluations for direct reports at least annually.
Password policy enforced
The company requires passwords for in-scope system components to be configured according to the company’s policy.
Security awareness training conducted
The company requires employees to complete security awareness training within thirty days of hire and at least annually thereafter.
Roles and responsibilities documented
The company has formally defined roles and responsibilities for security, and documents these in its information security policy.
Security policies reviewed annually
The company reviews and updates its security policies at least annually or when significant changes occur.

Product security

ControlStatus
Data encryption utilized
The company’s datastores housing sensitive customer data are encrypted at rest.
Control self-assessments conducted
The company performs control self-assessments at least annually to gain assurance that controls are in place and operating effectively. Corrective actions are taken based on relevant findings. If the company has committed to an SLA for a finding, the corrective action is completed within that SLA.
Penetration testing performed
The company’s penetration testing is performed at least annually. A remediation plan is developed and changes are implemented to remediate vulnerabilities in accordance with SLAs.
Data transmission encrypted
The company uses secure data transmission protocols to encrypt confidential and sensitive data when transmitted over public networks.
Vulnerability and system monitoring procedures established
The company’s formal policies outline the requirements for the following functions related to IT / Engineering:
  • vulnerability management;
  • system monitoring.

Internal security procedures

ControlStatus
Continuity and Disaster Recovery plans established
The company has Business Continuity and Disaster Recovery Plans in place that outline communication plans in order to maintain information security continuity in the event of the unavailability of key personnel.
Continuity and disaster recovery plans tested
The company has a documented business continuity/disaster recovery (BC/DR) plan and tests it at least annually.
Cybersecurity insurance maintained
The company maintains cybersecurity insurance to mitigate the financial impact of business disruptions.
Configuration management system established
The company has a configuration management procedure in place to ensure that system configurations are deployed consistently throughout the environment.
Incident response plan documented
The company maintains an incident response plan that is reviewed and tested at least annually. The plan includes roles, responsibilities, and communication procedures.
Risk assessment conducted annually
The company conducts risk assessments at least annually to identify threats and vulnerabilities, and develops mitigation strategies accordingly.
Risk register maintained
The company maintains a risk register that is reviewed and updated regularly to track identified risks and their mitigation status.
Change management procedures established
The company has change management procedures in place to ensure that changes to production systems are authorized, tested, and documented before deployment.
Vendor risk management program established
The company maintains a vendor risk management program that includes due diligence reviews of third-party service providers and ongoing monitoring of their security posture.
Board oversight of security program
The company’s board of directors or executive leadership provides oversight of the information security program and reviews security metrics regularly.

Data and privacy

ControlStatus
Data retention procedures established
The company has formal data retention and disposal procedures that define retention periods and secure deletion methods for customer and company data.
Customer data deleted upon leaving
The company deletes customer data upon termination of the service agreement in accordance with documented retention and disposal procedures.
Data classification policy established
The company maintains a data classification policy that defines categories for data sensitivity and handling requirements for each classification level.
Privacy policy publicly available
The company maintains a publicly available privacy policy that describes the types of data collected, how it is used, and the rights of data subjects.
Data processing agreements maintained
The company maintains data processing agreements with all subprocessors that handle personal data on behalf of the company and its customers.
Data subject access request process established
The company has a documented process for handling data subject access requests (DSARs) in compliance with applicable privacy regulations.
PII redaction procedures implemented
The company automatically detects and removes personally identifiable information from call recordings and transcripts using built-in PII redaction controls.