GrowByData
Ecommerce data services for online retailers
We can provide intelligence into your designated marketing areas - Country, Regions, County, Metro, ZIP Codes
Supports international language and monitor country specific TLDs of Google, Amazon, & other platforms in languages other than English
Introduction GrowByData LLC (“Company” or “We”) has defined its Security Policy in compliance with ISO/IEC 27001 standard. As a modern, forward-looking business, GrowByData LLC recognizes at senior levels the need to ensure that its business operates smoothly and without interruption for the benefit of its customers, shareholders, and other stakeholders.
In order to provide such a level of continuous operation, GrowByData LLC has implemented an Information Security Management System (ISMS) in line with the International Standard for Information Security, ISO/IEC 27001. This standard defines the requirements for an ISMS based on internationally recognized best practices.
The operation of the ISMS has many benefits for the business, including
GrowByData LLC maintains full certification to ISO/IEC 27001 by effective adoption of information security best practices validated by an independent third party, a Registered Certification Body (RCB).
Information Security Requirements A clear definition of the requirements for information security within GrowByData LLC is agreed upon and maintained with the internal business so that all ISMS activity is focussed on the fulfilment of those requirements.
Statutory, regulatory, and contractual requirements is also documented. Specific requirements with regard to the security of new or changed systems or services is captured as part of the design stage of each project.
It is a fundamental principle of GrowByData LLC Information Security Management System that the controls implemented are driven by business needs and this will be regularly communicated to all staff through team meetings and briefing documents.
Framework for Setting Objectives A regular cycle is used for the setting of objectives for information security to coincide with the budget planning cycle. This will ensure that adequate funding is obtained for the improvement activities identified. These objectives is based upon a clear understanding of the business requirements, informed by the management review process during which the views of relevant interested parties may be obtained.
Continual Improvement of the ISMS GrowByData LLC policy with regard to continual improvement is to:
Ideas for improvements may be obtained from any source including employees, customers, suppliers, IT staff, risk assessments and service reports. Once identified they will be recorded and evaluated as part of management reviews.
GrowByData LLC acceptable use policy GrowByData LLC has set the purpose of this policy to outline and ensure that internet resources are used appropriately when conducting business on behalf of the employer. Within this policy, “internet resources” include, but are not limited to: Web access, FTP (file transfer protocol) servers, the intranet, and the employer domain names and IP addresses. This policy applies to all GrowByData LLC employees, and exemptions are made only upon the approval of the Information Security manager
Guidelines to Business Use of the Internet Service Computer equipment and Internet access are the property of the GrowByData LLC and must be used in accordance with company policies.
Employees may use the internet only to complete their job duties, under the purview of their business objectives. Permissible, acceptable, and appropriate internet-related work activities include:
Internet use shall comply with all government laws, and will not violate other policies. Inappropriate and unacceptable Internet use includes but is not limited to
This policy allows room for the limited and reasonable personal use of the internet. This privilege may be revoked at any time when it has been identified that this benefit has been abused. Personal use shall not:
Employees must comply with the following security guidelines, rules, and regulations:
Access Management GrowByData LLC has a requirement to protect its information assets in order to safeguard its customers, intellectual property and reputation. The control of access to our information assets is a fundamental part of a defence in depth strategy to information security. If we are to effectively protect the confidentiality, integrity and availability of classified data then we must ensure that a comprehensive mix of physical and logical controls are in place. :
Data Leakage Prevention
Incident Response GrowByData LLC is committed to take reasonable measures to mitigate the harmful effects of the Incident and prevent further unauthorized access or disclosure: