Matter has technical and organization security measures in place to ensure an appropriate level of security, taking into account the nature, scope, context and purpose of the processing, and the risks for the rights and freedoms of natural persons. These measures include:
1 Commitment
Matter is committed to the security of our customers and their data. As a cloud-based company entrusted with some of our customers’ most valuable data, Matter is focused on keeping data safe. Matter undergoes periodic penetration testing, is designed to be GDPR-compliant, and encrypts data at rest and in-transit. Matter’s customers entrust sensitive data to our care. Keeping customer data safe is Matter’s priority.
2 Compliance
2.1 Security Awareness Training: Matter provides annual Security Training to all personnel. “Security Training” addresses security topics to educate users about the importance of information security and safeguards against data loss, misuse or breach through physical, logical and social engineering mechanisms. Training materials address industry standard topics which include, but are not limited to:
2.2 Vulnerability Scan: Matter ensures that vulnerability scans are performed on servers continuously and network security scans are completed at a minimum biannually, in each case using an industry standard vulnerability scanning tool.
3 Security
3.1 Process-Level Requirements
3.2 Network Requirements
3.3 Hosting Requirements
3.4 Application-Level Requirements
3.5 Data-Level Requirements
3.6 End User Computing Level Requirements
3.7 Compliance Requirements
3.8 Shared Responsibility: Matter’s Service requires a shared responsibility model. For example, Customer must maintain controls over Customer user accounts (such as disabling/removing access when a Customer employee is terminated, establishing password requirements for Customer users, etc.).
3.9 Specific Measures
Measure |
Description |
---|---|
Measures of pseudonymisation and encryption of personal data |
|
Measures for ensuring the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident |
|
Processes for regularly testing, assessing and evaluating the effectiveness of technical and organizational measures in order to ensure the security of the processing |
|
Measures for user identification and authorization |
|
Measures for the protection of data during transmission |
|
Measures for the protection of data during storage |
|
Measures for ensuring physical security of locations at which personal data are processed |
|
Measures for ensuring events logging |
|
Measures for ensuring system configuration, including default configuration |
|
Measures for ensuring data minimization |
|
Measures for ensuring data quality |
|
Measures for ensuring accountability |
|
Measures for allowing data portability and ensuring erasure |
|