Jump to content

Security Policy

From Daniliants Ventures
Revision as of 09:37, 29 April 2025 by Dventures (talk | contribs)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

💡 Data security stands as one of the utmost priorities in our operations, especially considering our close collaboration with clients who entrust us with access to their advertising accounts and confidential information. Adhering to high security standards is not just a requirement but an integral part of our professional responsibility.

Each of us has access to valuable information trusted to us by our clients. Observing security rules helps us maintain our clients' trust, ensure the integrity and confidentiality of their data, and successfully accomplish assigned tasks.

Given the remote nature of our work, security rules undoubtedly hold special significance. This document outlines key guidelines and instructions for ensuring data security, as well as norms of online behavior that must be strictly followed by all team members.

The following rules are mandatory for all employees and are intended to ensure data security and efficient work in a remote work environment.

General Provisions

  • Data Confidentiality: Adhere strictly to confidentiality when dealing with company data, including client and project information. Do not disclose confidential information.
  • Responsibility for Account Credentials: Do not share account credentials with individuals outside the company. Follow data exchange guidelines.
  • Use of Social Media: Refrain from posting confidential work-related or colleague-related information on social media. Maintain professionalism in online communication.
  • Device Protection: Ensure the presence of antivirus software and a firewall on your devices.
  • Software Updates: Regularly update operating systems and software to minimize vulnerability risks.
  • Strong Passwords: Use strong and unique passwords for all work and personal accounts. Update passwords when employees leave.
  • Two-Factor Authentication: Enable two-factor authentication for all accounts where possible for an additional layer of security.
  • Access Control: Follow the principle of least privilege, granting access only to necessary information and resources.
  • Reporting Violations: Immediately report any suspicious events, attacks, or data loss to the supervisor or project manager.

Internet Safety Rules

  • Network Security: When working remotely, ensure the security of your home internet connection. Use secure networks for handling confidential information.
  • Use Secure Connections: When working with online services and platforms, use secure (https) connections to prevent interception of confidential information.
  • Email and Phishing: Exercise caution when opening emails, especially from unfamiliar senders. Do not respond to suspicious requests or provide personal information via email. Verify the authenticity of links and attachments, especially if they come from unknown sources.
  • File Downloads: Before downloading files from the internet, ensure their safety. Use only official and verified sources.

Security Rules for Working with Ad Accounts

  • Access Control: Restrict access only to employees whose responsibilities include working with advertising. Maintain an up-to-date list of individuals with access.
  • Trusted Email Domains: Send invitations to join only to people with trusted email domains.
  • Two-Factor Authentication: Require all individuals with access to have two-factor authentication set up.
  • Management of Active and Inactive Users: Periodically review the list of people with access and remove inactive users.
  • Monitoring Activity: Monitor activity in advertising accounts closely. Investigate any suspicious actions (e.g., suspicious individuals with access, campaigns, etc.) immediately.
  • External Device Security: When using personal devices for work, ensure their security and compliance with company standards.
  • Phishing Protection: Be vigilant against phishing attempts, especially in emails suggesting changes to account credentials.
  • Compliance with Platform Standards: Adhere to all security rules and standards provided by advertising platforms.

Security Platform Standards

Google & Microsoft Security

Social Media Security

Website Security

We appreciate your attention to this matter and strongly urge compliance with all suggested norms and security rules to ensure the seamless operation of our team and strengthen the trust of our clients!