...
This Vanta policy template represents a complete, compliance-ready policy with placeholders for company specific text. Each policy section represents a policy-specific topic that you should consider and/or modify to match your company’s practices.
For each policy section
Consider if this section and its corresponding risks applies to you. If it does not, remove it and/or replace it with your organization’s corresponding practices.
Replace any highlighted text in angled brackets < >1 with your own language
Rewrite the policy language such that it reflects the practices of your organization
...
Policy completion checklist
Use Find to make sure that all text in angled brackets is replaced
Proofread your policy for spelling and grammar mistakes
Confirm that the policy’s content reflects your organizations practices
Add any company-specific letterhead, branding, and formatting
Remove this instructions page
Export this document as PDF — File > Save As > Change “File Format” to PDF
Upload the PDF to Vanta at https://app.vanta.com/policies
More questions?
A good rule-of-thumb is to keep your language high enough level such that it stays representative for at least a year. If you have more questions about how to use this template, please reach out to support@vanta.com or your auditor for additional guidance.
Data Management Policy
Policy Owner: <Policy owner>
Effective Date: <Effective date>
Owner: Managing Director
Effective Date: 2023-05-01
Purpose
To ensure that information is classified, protected, retained and securely disposed of in accordance with its importance to the organization.
...
Scope
All <Company Name> CloudCard data, information and information systems.
...
Policy
<Company Name> CloudCard classifies data and information systems in accordance with legal requirements, sensitivity, and business criticality in order to ensure that information is given the appropriate level of protection. Data owners are responsible for identifying any additional requirements for specific data or exceptions to standard handling requirements.
Information systems and applications shall be classified according to the highest classification of data that they store or process.
...
Data Classification
...
To help <Company Name> CloudCard and its employees easily understand requirements associated with different kinds of information, the company has created three classes of data.
Confidential
Highly sensitive data requiring the highest levels of protection; access is restricted to specific employees or departments, and these records can only be passed to others with approval from the data owner, or a company executive. Example include3:
Customer Data
Personally identifiable information (PII)
Company financial and banking data
Salary, compensation and payroll information
Strategic plans
Incident reports
Risk assessment reports
Technical vulnerability reports
Authentication credentials
Secrets and private keys
Source code
Litigation data
Restricted
<Company Name> CloudCard proprietary information requiring thorough protection; access is restricted to employees with a “need-to-know” based on business requirements. This data can only be distributed outside the company with approval. This is default for all company information unless stated otherwise. Examples include4:
Internal policies
Legal documents
Meeting minutes and internal presentations
Contracts
Internal reports
Slack Instant messages
Email
Public
Documents intended for public consumption which can be freely distributed outside <Company Name>CloudCard. Examples include5:
Marketing materials
Product descriptions and documentation
Release notes
External facing policies
...
Labeling
Confidential data should be labeled “confidential” whenever paper copies are produced for distribution.
...
Data Handling
...
Confidential Data Handling
Confidential data is subject to the following protection and handling requirements7:
Access for non-preapproved roles requires documented approval from the data owner
Access is restricted to specific employees, roles and/or departments
Confidential systems shall not allow unauthenticated or anonymous access
Confidential Customer Data shall not be used or stored in non-production systems/environments
Confidential data shall be encrypted at rest and in transit over public networks in accordance with the Cryptography Policy
Mobile device hard drives containing confidential data, including laptops, shall be encrypted
Additionally, such devices should be able to be erased remotely in the event that the device is lost or stolen.
Mobile devices storing or accessing confidential data shall be protected by a log-on password (or equivalent, such as biometric) or passcode and shall be configured to lock the screen after five (5) minutes of non-use
Backups shall be encrypted
Confidential data shall not be stored on personal phones or devices or removable media including USB drives, CD’s, or DVD’s.
Confidential data should not be stored on laptops except for short periods of time necessary to transfer data or produce analyses of data. Where possible, all uses of confidential data should be performed on approved systems without downloading.
Paper records shall be labeled “confidential” and securely stored and disposed of in a secure, approved manner in accordance with data handling and destruction policies and procedures
Hardcopy paper records shall only be created based on a business need and shall be avoided whenever possible8
Hard drives and mobile devices used to store confidential information must be securely wiped prior to disposal or physically destroyed
Transfer of confidential data to people or entities outside the company shall only be done in accordance with a legal contract or arrangement, and the explicit written permission of management or the data owner
...
Restricted data is subject to the following protection and handling requirements9:
Access is restricted to users with a need-to-know based on business requirements
Restricted systems shall not allow unauthenticated or anonymous access
Transfer of restricted data to people or entities outside the company or authorized users shall require management approval and shall only be done in accordance with a legal contract or arrangement, or the permission of the data owner
Paper records shall be securely stored and disposed of in a secure, approved manner in accordance with data handling and destruction policies and procedures10
Hard drives and mobile devices used to store restricted information must be securely wiped prior to disposal or physically destroyed
...
No special protection or handling controls are required for public data. Public data may be freely distributed.
...
...
Data Retention
<Company Name> CloudCard shall retain data as long as the company has a need for its use, or to meet regulatory or contractual requirements. Once data is no longer needed, it shall be securely disposed of or archived. Data owners, in consultation with legal counsel, may determine retention periods for their data.
Personally identifiable information (PII) shall be deleted or de-identified as soon as it no longer has a business use11.
Retention periods shall be documented in the Data Retention Matrix in Appendix B 12 to this policy.
...
Data & Device Disposal
Data classified as restricted or confidential shall be securely deleted when no longer needed. <Company Name> CloudCard shall assess the data and disposal practices of third-party vendors in accordance with the Third-Party Management Policy. Only third-parties who meet <Company Name> CloudCard requirements for secure data disposal shall be used for storage and processing of restricted or confidential data13.
<Company Name> CloudCard shall ensure that all restricted and confidential data is securely deleted from company devices prior to, or at the time of, disposal.
Confidential and Restricted hardcopy materials shall be shredded or otherwise disposed of using a secure method1415.
Personally identifiable information (PII) 16 shall be collected, used and retained only for as long as the company has a legitimate business purpose. PII shall be securely deleted and disposed of following contract termination in accordance with company policy, contractual commitments and all relevant laws and regulations. PII shall also be deleted in response to a verified request from a consumer or data subject, where the company does not have a legitimate business interest or other legal obligation to retain the data.
...
...
Annual Data Review
Management shall review data retention requirements during the annual review of this policy. Data shall be disposed of in accordance with this policy.
...
Legal Requirements
Under certain circumstances, <Company Name> CloudCard may become subject to legal proceedings requiring retention of data associated with legal holds, lawsuits, or other matters as stipulated by <Company Name> CloudCard legal counsel. Such records and information are exempt from any other requirements specified within this Data Management Policy and are to be retained in accordance with requirements identified by the Legal department. All such holds and special retention requirements are subject to annual review with <Company Name>’s CloudCard’s legal counsel to evaluate continuing requirements and scope.
...
Policy Compliance
<Company Name> CloudCard will measure and verify compliance to this policy through various methods, including but not limited to, business tool reports, and both internal and external audits.
...
Exceptions
Requests for an exception to this policy must be submitted to the <approver of requests for an exception to this policy, e.g., CFO> Managing Director for approval.
...
...
Violations & Enforcement
Any known violations of this policy should be reported to the <who should receive reports of violations to this policy, e.g., CFO>. Managing Director. Violations of this policy can result in immediate withdrawal or suspension of system and network privileges and/or disciplinary action in accordance with company procedures up to and including termination of employment. Anchor
Version | Date | Description | Author | Approved by |
1. |
0 |
2023- |
03- |
21 |
<First Version>
<OWNER>
First Version | Ryan Heathcote | Luke Rettstatt | ||
APPENDIX A – Internal Retention and Disposal Procedure
...
CloudCard’s Principal Engineer is responsible for setting and enforcing the data retention and disposal procedures for <Company Name> CloudCard managed accounts and devices.
...
Customer accounts and data shall be deleted within <sixty sixty (60) > days of contract termination through manual data deletion processes.
...
Employee devices will be collected promptly upon an employee’s termination. Remote employees will be sent a shipping label and the return of their device shall be monitored.
Collected devices will be cleared to be re-provisioned—or removed from inventory;, <Company Name> . CloudCard will securely erase the device when reprovisioning.
Device images may be retained at the discretion of management for business purposes
...
In cases where a device is damaged in a way that <Company Name> CloudCard cannot access the Recovery Partition to erase the drive, <Company Name> CloudCard may optionally decide to use an E-Waste service that includes data destruction with a certificate. <Company Name> CloudCard will keep certificates of destruction on record for one year. Physical destruction can be optional if it is verified that the device is encrypted with Full Disk Encryption, which would negate the risk of data recovery.
Management will review this procedure at least <frequency of procedure review, e.g., annually>.annually.
APPENDIX B – Data Retention Matrix
...
System or Application | Data Description | Retention Period |
CloudCard SaaS Products (AWS) | Customer Data | Up to 60 days after contract termination |
CloudCard Support | Customer instance and metadata, debugging data | Indefinite |
CloudCard Customer Sales and Support |
Conversations ( |
Close.io) |
Opportunity and |
Sales Data | Indefinite |
CloudCard Customer Support |
Conversations ( |
HelpScout) | Support |
Email Conversations | Indefinite |
CloudCard Security Event Data ( |
AWS) | Security and system event and log data, network data flow logs |
Indefinite |
AWS Instance - 1 year
CloudCard Vulnerability Scan Data ( |
<Company Name> Customer Sales (Salesforce)
Opportunity and Sales Data
Indefinite
Snyk / Amazon Inspector) | Vulnerability scan results and detection data | 6 months |
host (asset) data is retained until removed and purged from Qualys
CloudCard QA and Testing Data ( |
Trello) | QA, testing scenarios and results data | Indefinite |
Security Policies | Security Policies | 1 year after archive |
Temporary Files |
AWS /tmp ephemeral storage | automatically when process finishes |
...
1 All fields in this document marked by angled brackets < > and highlighted must be filled in.
2 Describe your company’s data classification labels here. Customize the labels to meet your company’s needs.
3 Update this list of examples to fit your organization
4 Update this list of examples to fit your organization
5 Update this list of examples to fit your organization
6 Update the data classification labels in this section to describe the systems that your company uses
7 Update this list of confidential data handling requirements to fit your organization
8 Hardcopy added for v2
9 Update this list of restricted data handling requirements to fit your organization
10 Paper records added for v2
11 PII de-identification or deletion added for v2
12 This is a reference to an appendix in this document. If this is documented elsewhere, include a reference or a link to the document.
13 If your company does not use third-parties to process sensitive data, you can delete these sentences.
14 This is a reference to another Vanta policy. If you are not planning on using the Third-Party Management Policy, describe your data disposal practices of third-party vendors here.
15 Hardcopy added for v2
16 PII added for v2
17 In this appendix, describe your company’s internal data retention and disposal procedures. The content here is provided as an example.
18 You can remove this table from the document as long as you include a link or a reference to your data retention matrix. It is recommended that you structure your matrix like this table.
...
Appendix C: Technical Protection Mechanisms
Photos and Supporting Documents are encrypted at rest using Server-Side Encryption with Amazon S3-Managed Keys (SSE-S3), each object is encrypted with a unique key. As an additional safeguard, the key itself is encrypted with a master key that is regularly rotated. The server-side encryption uses 256-bit Advanced Encryption Standard (AES-256), to encrypt all data. For more information, see Protecting Data Using Server-Side Encryption with Amazon S3-Managed Encryption Keys (SSE-S3).
All photo metadata stored at rest in the underlying storage is encrypted, as are all automated backups, read replicas, and snapshots using AES-256 encryption algorithm.
Photos, photo metadata, and supporting documents are encrypted in transit using HTTPS. Clients are required to support TLS 1.2 encryption or higher.
All data is securely deleted using the techniques detailed in or NIST 800-88 (“Guidelines for Media Sanitization”) as part of the decommissioning process. Refer to AWS Overview of Security Processes Whitepaper for additional details - available at http://aws.amazon.com/security
All CloudCard servers enable automatic minor and patch updates during weekly update windows.
All CloudCard employee laptop file systems are encrypted at rest