At Mediaocean we understand how critical it is to your business to keep your information secure by making sure that it remains:
- Confidential, and only divulged to people who are authorized to access your data
- Available to authorized people when they need to access it
- Accurate and free from loss or corruption
In order to achieve this, Mediaocean management has set information security objectives for the company and has put in place controls and procedures to meet them. These controls are monitored internally and are externally audited.
We have prepared a System Description which provides an overview of Mediaocean's application suites and describes our information security controls and procedures. This document is intended to give you and your auditors a general understanding of our information security policies and procedures, and covers control areas including:
- Logical access controls
- Network security
- Physical access controls
- System software support and change control
- Processing integrity
- Availability and data retention
- Applications software development
- Incident management
The System Description includes a general introduction to Mediaocean's control environment including organizational structure, commitment to integrity, competence and ethical behavior, and management oversight, and gives information about Mediaocean's data centers and business continuity arrangements.
It also includes a list of user control considerations. These are practices our clients need to consider and put in place in order to ensure that information security objectives can be achieved.
If you require a copy of our System Description, please send an email request to firstname.lastname@example.org.