the security of data is important to us. this document is intended to answer as many questions as possible about the security, reliability, and availability of ddi’s applications and data processing systems. this document outlines the flow of data for ddi technology-based solutions and address the security measures that we have taken to protect each part of the process.
DDI: Who We Are, What We Do
Founded in 1970, Development Dimensions International (DDI), a global human resource consulting firm, helps organizations close the gap between today’s talent capability and future talent needs. DDI’s expertise includes designing and implementing selection systems and identifying and developing front-line to executive leadership talent. For more information about DDI visit http://rocamaribiza.com.
DDI’s Approach to Data Security
today’s talent management environment requires the processing of electronic records. application functionality depends on information storage and transfer across ddi networks and the internet. appropriate security is essential and is fully integrated with application functionality and processes. ddi maintains a consistent security framework with appropriate privacy standards within which system applications and user populations leverage information within various business contexts. ddi employs a multi-layered approach to information security as it relates to the protection of user data (including candidate, participant, learner, administrator, and customer information) and prevention from unauthorized access, alteration, or destruction. our policies and processes are designed to:
- Establish DDI’s approach to information security
- Define mechanisms to protect data and prevent its misuse
- Educate DDI associates on the importance of safe data management and recognizing potential security threats
- Provide a communication channel for external queries about this policy and associated systems
ddi is committed to operating our businesses in a manner that fosters confidence and trust, which includes the proper use and management of personal data provided to us by our colleagues, customers, and suppliers.
to ensure data integrity, ddi has resources, policies, and processes dedicated to data protection, including a data security and compliance office and data protection officer, who routinely monitor global standards.
网上开户ddi’s data protection officer (dpo) sets and enforces the vision and strategy for the company’s security and compliance program, with the goal of global consistency, ascertaining that risks are managed appropriately, and objectives are achieved.
Security in Partnership
The security and confidentiality of our customers’ data is a shared responsibility between DDI and our customers. DDI provides a secure platform on which customers can access and leverage their data. In addition, DDI provides tools, services, support, and resources that enable our customers to ensure the security of their data throughout the lifecycle of the engagement. See DDI’s Privacy Statement.
customers are jointly responsible for the security of their data during and after their engagement with ddi. customers must understand what data is being collected and held within ddi systems and define the appropriate data sharing policy to ensure that data is shared with only those who are authorized to access it. the data sharing policy should align with risk and compliance requirements that correlate to the importance and classification of that data.
DDI’s Role as a Data Processor
DDI clients operate as a “Data Controller” pursuant to the European Union (EU) Privacy Model Clauses. DDI functions as a “Data Processor” pursuant to EU Model Clauses and the General Data Protection Regulation (GDPR). See DDI’s Privacy Statement.
EU Data Protection Regulations
网上开户ddi is headquartered in the united states and serves customers globally and has employed mechanisms to ensure that data transfers from the eu to the u.s. provide the legal protections required by eu data protection regulations, including privacy shield (a replacement to safe harbor), eu model contract clauses and end user consent. ddi’s certification under the privacy shield program may be viewed at the privacy shield site:
EU Model Clauses
网上开户the eu model clause is a standard contract addendum between service providers such as ddi and its customers, designed to ensure that any personal data leaving the eea will be transferred in compliance with eu data- protection law and meets the requirements of the eu data protection directive 95/46/ec.
网上开户on may 25, 2018, a privacy mandate called the general data protection regulation (gdpr) came into effect. the gdpr expands the privacy rights of residents of the european union and places new obligations on service providers like ddi that control and process personal data from the eu. ddi views gdpr as an opportunity to deepen our commitment to privacy and data protection internally and with all our global clients.
as the new era of data privacy unfolds, it goes beyond policies and system settings, requiring both organizational and cultural shifts. compliance with the gdpr demands a partnership between ddi, its sub-processors, and our customers. ddi is committed to gdpr compliance throughout our operations and in the delivery of service to our clients. ddi is also dedicated to helping our customers comply throughout our partnership. ddi closely analyzed requirements of the gdpr and implemented enhancements to our products, contracts, and documentation assure compliance with the regulations.
Third Party Providers
ddi utilizes third party providers for the provisioning of our services to you as described in our agreements. all third-party providers are required to comply with ddi’s data processing, protection, and security standards.
For a list of our current sub-processors please see http://rocamaribiza.com/thirdpartyproviders
ddi classifies personal data we collect and process into four categories, each requiring specific actions to ensure security. data collected is reviewed on a periodic basis and classified according to its use, sensitivity, and importance. see the confidential information policy for details.
Technical and Organizational Measures
many of our key technical and organizational measures (toms) data security and integrity are listed below. additional details for these and other controls are described in detail later in this document.
|Cloud||DDI utilizes a variety of cloud-based, GDPR compliant platforms|
|Data Privacy and Security Awareness Training||Regular training for DDI associates to learn about data privacy, confidentiality, and security best practices. Teach end users to recognize and avoid phishing attacks, social engineering traps, malicious links, and downloads|
|Physical Security||DDI hosts client facing applications at redundant data centers that are ISO-27001, SOC 2 and SSAE-18 certified|
|Network Security||Managed anti-virus on all components Application-layer firewall Dual redundant multi-segmented network-layer firewalls Physical and logical network separation of each tier|
|Infrastructure Redundancies||Redundant power with Uninterruptible Power Systems (UPS) Connections to multiple Internet provider networks Redundant component infrastructure Clustered high availability systems SAN storage technology for storage redundancy Load balancing for application redundancy “Hot-spares” for all essential network production equipment|
|Monitoring and Intrusion Detection||Intrusion detection on all network segments 7x24 monitoring, detection, and alert of malicious activity 7x24 monitoring, detection, and alert of system anomalies Regular log review|
|Infrastructure Access Controls||Least-Rights-Necessary access model Configurable session inactivity timeouts Encrypted passwords Strong password policy for privileged accounts and servers.|
|Independent Audit||Annual data processing and financial systems audit Third party certification of controls and processes|
|QA & Testing||Separate QA & testing platforms Gated code promotion strategy Automated and “white box” QA testing processes|
|Authentication & Authorization||Role-based Fully HTTPS/SSL compliant Supports SAML Single Sign-On (SSO)|
|Platform Availability, Stability & Performance (ASP)||Highly scalable virtualized platforms End-user experience monitors for application performance|
|Vulnerability Assessment||Annual infrastructure vulnerability scans Annual Application Penetration Assessment (APA) Quarterly Managed Application Scans (MASs)|
ddi hosts client facing applications at redundant ssae18, soc 2 type ii, iso / iec 27001:2013, hipaa/hitech, pci dss 3.1 certified data centers.
网上开户ddi’s server infrastructure is located in a dedicated 8’ x 8’ enclosed caged area. access to this area is limited to the ddi staff responsible for managing the application servers and network components. the data center facility has implemented extensive systems to provide security and physical plant protection. these systems include physical security, fire prevention, security and fire alarms, video surveillance, multiple levels of card access, 24-hour staffing and detailed access and visitor logs. only data center facility authorized engineers can open and lock equipment cabinets. additionally, there are no customer names on the cabinets and no cabinet floor plans to associate cabinets with customers. inside the facility, closed circuit television (cctv) cameras mounted above each cabinet row monitor all activity.
网上开户all ddi equipment is monitored in a temperature-controlled environment. ddi’s hosted solutions operate at an average temperature between 65 and 75 degrees fahrenheit and average relative humidity between 30% and 45%. all equipment is protected by a fire suppression system with a built-in early warning detection system. the very early smoke detection apparatus (vesda) system detects abnormal particulate matter in the air. a pre-activation fire detection system verifies a fire before activating the suppression system. heat detectors above and below both the floor and ceiling are controlled in the noc (network operations center) and monitored off-site.
physical access to ddi’s application and network systems is highly controlled. all points of entry have badge readers to permit or deny access and video surveillance that is monitored 24x7 by data center facility personnel. access to this facility is protected 24x7 by security personnel and limited to authorized individuals with a need to manage ddi systems. all approved ddi resources are issued a photo id for access. upon an access request, data center facility personnel will verify name and photo matches name and photo in their secure system. logs of such access are monitored electronically via the badge access system and are reviewed quarterly.
the data center facility’s hot sync parallel/redundant systems provide redundant power supply through uninterruptible power systems (ups) and backup generators. in the event of power failure, an on-site diesel generator system automatically generates power to both ac and dc systems, powering the internal data center facility network without interruption to service. there are connections to multiple telecommunications companies’ networks for redundant internet access and connectivity is load-balanced and provided by more than one isp. in addition, ddi automatically replicates all production services to a geographically diverse secondary datacenter facility which ensures rapid service recovery in the event of failures at the primary site. san and raid technology solutions are used for storage redundancy and secondary “hot-spare” hardware for core network infrastructure and production application server components is available for production systems. ddi it maintains the service restoration plans for all services, systems, and applications.
ddi maintains a detailed disaster recovery plan for restoring business service in the event of a large-scale system failure. this plan is updated as any changes are made to the system infrastructure or production web farm configuration and is tested on an annual basis.
ddi only stores data in data centers that have received unbiased favorable annual sas 70 type ii audits. note that the sas 70 has been replaced by the statement on standards for attestation engagements (ssae) no. 18 and our data centers are certified to that standard.
网上开户ddi only uses data centers that have demonstrated their adherence by periodic assessments and annual certification.
SOC 1/ SOC 2
ddi is neither soc 1 nor soc 2 certified. however, ddi’s data hosting provider does keep current soc 2 certifications.
ddi’s servers provide a wide variety of services to both internal and external users, and some servers store or process information that may be considered sensitive or confidential in nature. given the fact that servers can be targeted for attack, it is critical that ddi servers are secured appropriately. ddi’s process of enhancing server security includes the following measures:
- The disablement or removal of unnecessary services, applications, and network protocols.
- The disablement of unneeded user accounts and renaming of default accounts.
- Password requirements configured to comply with the DDI Password Policy (see Appendix I).
- Activation of server logging and audit trails.
- Installation of anti-virus / anti-malware software with current definition files.
- Configured with current security patches.
For security reasons, we cannot provide all details of our server security controls.
high impact patches are defined as patches that will protect against a security risk that has the potential to significantly impact our network on or before the date of the patch. ddi’s it team immediately distributes these patches to all devices after testing of the patch on our test platforms. distribution will occur no later than 24 hours after identification.
网上开户medium or low impact patches are defined as patches that will protect against a future security risk. ddi distributes these patches to all devices after testing of the patch on our test platforms and testing with a control group of users. distribution will occur no later than 2 weeks after testing is complete.
Backup, Retention and Archiving Procedures
data is incrementally backed up on a nightly basis to ensure that all applications and client data is preserved and available to be restored in the event of any loss of data or catastrophic event. hot back- ups are made to disk and transferred to tape. these backup tapes are rotated, with 30 days of daily backups being maintained. monthly and yearly 128bit aes encrypted backup tapes are archived offsite.
in accordance with the ddi rotation schedule, authorized datacenter personnel log the tapes into the iron mountain web portal, and then physically place the tapes in a "lock box" for pickup by iron mountain. authorized iron mountain personnel then store the tapes, in the ddi dedicated and secured cage within iron mountain.
if a system recovery is necessary, ddi system engineers will retrieve the file, data, or system state if it is less than 24 hours from an on-line backup system. in this event, system or database recovery can be completed in a matter of minutes or possibly several hours. if the file, data, or system state is greater than 24 hours old, ddi system engineers will contact its’ data center facility to retrieve the necessary tape. this retrieval can take several hours or possibly up to one day. after the tape is loaded into the library, ddi system engineers will recover the file, data, or system state immediately.
Backup Schedules and Data Retention
- Physical File Servers and DB Server Backups: (Retained for 35 days on disk)
- Production VMs: (Retained for 35 days on disk)
- SharePoint Sites: (Retained for 35 days on disk)
- Monthly Copy to Tape: (Retained for 1 year on tape at Iron Mountain)
- Yearly Copy to Tape: (Retained for 5 years on tape at Iron Mountain)
Asset Recover, Recycling and Disposal
Hardware Recycling/Disposal Procedure
- When Hardware has reached its end of life cycle, the hardware is stored in a locked asset room and retained for disposal.
- Retired equipment is recycled through an R2 Certified Recycling vendor
- DDI receives a Detailed Destruction report of the assets that were recycled for record keeping.
Hard Drive Disposal Procedure
- All Hard drives, tape media, Optical drives, etc.… are removed from the hardware and retained for secure bulk destruction at a later date.
- For secure data destruction, DDI has contracted the services of recycling vendors who employ Low level, Department of Defense Approved, 7 pass wipe (DoD 5220.22-M(ECE)).
- This process is compliant with HIPPA, FACTA, GLB, and unclassified government material
- Non-functional hard drives will be degaussed.
- All data is purged as set forth in NIST Special Publication 800-88
- DDI receives and retains a Certificate of Destruction for record keeping.
网上开户ddi’s network infrastructure consists of dual ha pair of devices providing load-balancing and acceleration capabilities that listens for requests coming via http (redirected to https) or https to a web site’s external ip address. the hardware load-balancer translates this to an internal ip of web/application servers and routes the request appropriately. application servers are maintained in a perimeter, web-facing dmz. database and file servers are protected behind additional firewalls with very limited access rules that are only for application traffic. strong passwords protect server and service accounts.
firewall protection is provided by devices functioning as high as layer 7 of the osi model. all hardware is in a redundant passive-active configuration.
Intrusion Detection and Monitoring
网上开户ddi uses a comprehensive set of tools that provide continuous real-time monitoring of every component to enable security monitoring, patch management and other remote administration functions. ddi employs a managed services security company for security monitoring, firewall management and intrusion detection systems (systems designed to detect potential threats real time) and response processes.
ddi employs both host-based and network-based detection systems that are monitored and responded to on a 24x7 basis. ddi it is notified immediately upon the detection of any anomalies via cell phone. weekly reports are provided to ddi for review. penetration tests are conducted quarterly.
Malware and Anti-Virus Protection
ddi utilizes several monitoring products to monitor network, servers, databases, and web sites. all application and system event logs are monitored as well. the monitoring environment is configured to automatically send alerts to appropriate staff that are on call 24x7. specific escalation paths to appropriate ddi system engineers and dbas exist to help resolve the issue as quickly as possible.
网上开户in addition, ddi network monitoring systems periodically conduct complete scans of every active node on the network to ensure that these nodes are properly configured and are running the most current version(s) of the anti-virus and other security-impacting (ex: hotfixes; service packs; etc.) code.
网上开户all appropriate systems – pcs, servers, gateways systems etc. - are protected by microsoft’s endpoint protection anti- virus and “zero-day protection” software that is centrally managed and updated.
all gateways are protected by anti-virus software that is centrally managed and updated and the email and browsing infrastructure employs content scanning and heuristic scanning techniques to ensure data is virus-free.
Secure Data Transmission and Encryption
网上开户ddi uses ssl/tls 1.2 for secure https application data access. ssl technology is provided as standard for all ddi applications and all backup tapes are encrypted using 256bit aes encryption. encryption is used for passwords stored in application databases.
网上开户all files (regardless of confidentiality) remain encrypted when copied from a ddi laptop to an external storage device. if the external device is not encrypted, ddi’s enterprise encryption software will automatically encrypt and password-protect the external device. in addition, ddi utilizes hyperconverged infrastructure that encrypts data at rest utilizing storage controller-based encryption.
网上开户email is not considered to be a secure form of communication.
Account Administration and Remote Access
网上开户end-users are granted ‘least privileged access’ permissions to effectively and efficiently do their jobs. all infrastructure component administration and account management are strictly controlled by ddi. user accounts are automatically disabled after excessive failure to login correctly. server and service accounts are required to have strong passwords containing alpha, numeric, and special characters. ddi uses ssl vpn technology for remote access. ddi’s vpn systems utilize radius authentication, 256-bit cipher strength and encryption. user accounts are automatically disabled after excessive failure to login correctly.
网上开户when using ddi applications, data typically flows between three important parties—end users, client associates/candidates, and ddi.
when an end-user accesses a ddi application, the information they provide is submitted via secure encrypted (https) methods. web data is delivered to the end-user in the form of test/assessment questions, surveys, graphics, and other content included in the ddi application. the data is processed by the application servers and submitted to database servers for storage. web/application and database servers are located on separate logical and physical networks protected by firewalls.
ddi uses ssl/tls 1.2 for secure https application data access. ssl technology is provided as standard for all ddi applications and all backup tapes are encrypted using 256bit aes encryption. encryption is used for passwords stored in application databases. all data (regardless of confidentiality) remains encrypted in transmission and at rest.
applications use a role-based security model to determine access rights. client data is segregated logically based on site, document, user, and other criteria. system changes are controlled through the change management process (detailed in later sections) addressing quality assurance, testing, documentation, change scheduling, and other such it operational “best practices”.
Least Rights Access
access to all data (irrespective of classification) is provided using a “least rights necessary” security model, i.e., granted to those with a legitimate business need such as end-users, client administrators, and various ddi and client support teams.
Access to Data
additional measures may be used to ensure that data are secured according to the requirements for each classification. individuals who may be granted access include:
- End Users
End users are people who engaged in an online process (such a test or assessment) or created or responded to a survey.
- Client Administrators
Client Administrators are system end-users who manage accounts and workflow processes within a DDI application system, such as hiring managers, staff development professionals, and other Human Resources roles. Administrators may be either client associates or DDI associates who input personal information on behalf of clients or applicants and may progress them through different process phases.
- Support Personnel
When a user requests technical support from DDI’s Product Support team, that user may grant a support representative temporary access to the account. The support team may need to view an individual user’s test, assessment, or survey as part of the support incident resolution. Access to client data is only granted to those with a legitimate business need based on an industry standard “Least Rights Necessary” model.
Access to Applications
applications use a role-based security model to determine access rights. client data is segregated logically based on site, document, user, and other criteria. system changes are controlled through a best practice change management process.
Access to Client Application Data
client administrators are system end-users who manage accounts and workflow processes within a ddi application system. administrators may be either client associates or ddi associates who input personal information on behalf of clients or applicants and may progress them through different process phases. examples include hiring managers, staff development professionals, and other human resources roles.
Direct Database Access
only very select members of ddi’s engineering team have access at a database level. this access is used for creating off-site backups and performing data restorations. this is all done without viewing data.
when a user requests technical support from ddi’s product support team, they may grant a support representative temporary access to the account. the support team may need to view an individual user’s test, assessment, or survey as part of the support incident resolution.
Access to DDI Network Accounts
end-users are granted ‘least privileged access’ permissions to effectively and efficiently do their jobs. all administration and account management are strictly controlled by ddi. user accounts are required to have strong passwords and password-protected screen savers. account access will be automatically disabled after excessive logon failures or termination of employment.
Access to Data Centers or Backups
physical access to data centers is restricted to a named list of associates. physical access does not mean access to data. the physical media resides on servers in a locked cabinet. off-site backups are stored in a fire safe in a secure room. access to this room is restricted and logged.
Application Penetration Testing
ddi employs a managed services security company to test for “dynamic vulnerabilities” such as logic flaw problems, unpublished exploits, and other risks specific to the application environment, which also tests for known and published or “static vulnerabilities”.
performed annually is the application penetration assessments (apas) which includes application scanning followed by intensive manual testing to identify application vulnerabilities. reporting is fully customized and includes both positive and negative findings.
Quarterly Managed Application Scans
performed quarterly is the managed application scanning (mass) which includes application level scanning, false positive validation, and automated reporting.
- Detailed report received from third party security vendor.
- Findings reviewed by the Data Security Manager, Data Protection Officer, Director of Global Infrastructure and Director of Product Development.
网上开户findings risk analysis
- For critical and high ratings, a problem ticket is created in the service management system and assigned for immediate action.
- For medium and low ratings, entries are added to the application backlog and prioritized against other development work.
- All findings and prioritization details are shared and vetted at the DDI Data Security Office’s Risk Analysis meeting. If the severity of any finding is deemed to be changed, this decision is documented and shared with application development partners.
vulnerabilities are classified using the cvss scale per the cvss v3.0 specification () and can be calculated on a per-vulnerability basis using the cvss calculator ().
vulnerability remediation is to be completed as soon as possible once identified using the following table:
|Critical||Critical vulnerabilities have a CVSS score of 9.0 or higher. They can be readily compromised with publicly available malware or exploits||2 days|
|High||High-severity vulnerabilities have a CVSS score of 7.0-8.9. There is no known public malware or exploit available||30 days|
|Medium||Medium-severity vulnerabilities have a CVSS score of 4.0 to 6.9 and can be mitigated within an extended time frame||90 days|
|Low||Low-severity vulnerabilities are defined with a CVSS score of 0.1 to 3.9. Not all low vulnerabilities can be mitigated easily due to applications and normal operating system operations. These should be documented and properly excluded if they can’t be remediated||180 days|
|None||Information vulnerabilities have a CVSS score of 0.0. These are considered potential risks but are generally reference information for the state and configuration of an asset||Not required|
DDI Associate Policies
ddi employs rigorous processes and controls over access and permissions for all infrastructure components, networks, firewalls, servers, databases, etc. this is strictly controlled within the global technology group who has final authority on all administrative user access, system monitoring/notifications, as well as os, security, and application updates.
all computers are configured to have a password-enabled screen saver. ddi’s policy for screen lockout is 15 minutes. after 15 minutes of inactivity the screen saver will be invoked. the user must then reenter their password to gain access to the computer.
Passwords are an important aspect of computer security. A poorly chosen password may result in unauthorized access and/or exploitation of DDI's resources. To view DDI’s full Password Policy, please reference Appendix I.
as soon as administrative access to ddi systems and application platforms is no longer required for job responsibilities, it is revoked. this includes termination of employment as well as changes to roles or responsibilities in the company.
网上开户this process is completed within 24 hours of a role change, or immediately in the event of involuntary employment termination. in addition, we regularly review which associates have these permissions and make changes as needed.
Data Privacy and Security Awareness Training
all ddi associates receive regular training and best practice guidance on data privacy, security, and confidentiality. completion of training is monitored to promote the highest level of compliance.
Product Development Process and Code Management
Development Release Cycle
ddi employs an agile development model. agile is an iterative approach to software development and provides a very nimble capability that allows ddi to rapidly respond to the needs of our clients. we have a planned new code release cycle – typically a weekly cycle.
this means that approximately every week ddi releases new features and upgrades. it also gives us frequent windows for releasing fixes to features that do not work as desired. outside of this cycle we can make “emergency” releases as urgency dictates.
ddi uses separate application instances for testing updated code and have separate instances for early candidate code, and release candidate software. this protects data from ever being controlled or accessed by code still in development. all development code runs against “dummy databases”.
programmers work individually or in teams developing new code. as the end of each cycle approaches, code is peer-reviewed and tested in a qa environment separate from the production environment. this testing period allows us to eliminate most bugs before they are ever introduced to production. code is also programmatically inspected for known vulnerabilities.
网上开户git is used to manage the software development process and serves as the source-code repository. the tool and related processes ensure that no changes are overwritten due to multiple developers making changes to the same module. change control processes exist at many different levels within application development, qa and implementation including:
- Change Request documentation and ownership that includes review, approval, and documentation of all changes by the application owner
- A gated approval process for code promotion from: Development to QA; QA to Staging; and Staging to Production
- Software testing and QA is a multi-phased (unit test followed by system test, followed by user acceptance test) process. Development and unit testing is done on separate development systems by software developers, before being released for system and user acceptance testing on the separate QA systems.
Global People Services (Human Resource Policies)
网上开户upon hire, all ddi associates are required to sign a confidentiality agreement that specifically addresses the concerns and risks of dealing with confidential information. any associate found to have violated this policy is subject to immediate termination or any applicable legal action.
Background Check Policy and Procedure
DDI believes that hiring qualified individuals to fill positions contributes to the overall strategic success of the company. Background checks serve as an important part of the selection process at DDI. This type of information is collected as a means of promoting successful candidate matches for the position, as well as a safe and secure work environment for current and future employees. Background checks help DDI obtain additional applicant related information that helps determine the applicant's overall employability, ensuring the protection of the current people, property, and information of the organization. See Appendix II网上开户 to review the full Background Check Policy and Procedure.
网上开户ddi’s pre-employment checks are designed to ensure that all associates are confirmed to have the degrees and certifications that they purport and/or are required to have. all prospective associates have their stated employment histories and integrity references verified.
all us-based associates are verified legal us workers, and social security numbers or work authorizations are verified.
Security Incident Response
网上开户ddi enforces a comprehensive security incident detection and response plan including intrusion detection, scans, and other methods deemed effective and appropriate. while computer-related incidents are most common, non-computer-related incidents can also be reported through the incident hotline or by contacting ddi’s dpo or corporate counsel.
The purpose of the Security Incident Response and Notification Policy is to provide general guidance to DDI’s Technical and Managerial staff to enable quick and efficient recovery from physical or logical security incidents including the reporting of, responding to and managing unauthorized access to and/or loss of Confidential Information. DDI shall report any security incidents to affected or potentially affected clients within 72 hours of discovering a security breach.
in the event of a security breach, or suspected security breach the following actions must occur.
- Immediate notification of the following DDI personnel:
- Data Protection Officer
- DDI General Counsel
- Data Security Office
- Proper incident identification and documentation (must include):
- Description of the relevant incident
- Time and date on which occurred and was detected
- The person who reported it, and to whom it was reported
- Description of Personal Data that may have been compromised
- Incident containment activities.
- Incident eradication activities or processes.
- Incident recovery and review.
Appendix I - DDI Password Policy
passwords are an important aspect of computer security. a poorly chosen password may result in unauthorized access and/or exploitation of ddi's resources. all users, including contractors and vendors with access to ddi systems, are responsible for taking the appropriate steps, as outlined below, to select and secure their passwords.
网上开户the purpose of this policy is to establish a standard for creation of strong passwords, the protection of those passwords, the frequency of password changes, and lockout policy for invalid attempts.
网上开户the scope of this policy includes all personnel who have or are responsible for an account (or any form of access that supports or requires a password) on any system that resides at any ddi facility, has access to the ddi network, or stores any non-public ddi information.
- All system/server-level passwords (e.g., root, Windows Administrator, application administration accounts, etc.) and user-level passwords (e.g., email, web, desktop computer, etc.) must be changed at least every 90 days.
- All system/server-level and user-level passwords must conform to the guidelines described below.
- Microsoft’s multi-factor authentication is required for all mobile devices.
Guidelines / Standards
system/server-level and user-level passwords have the following requirements:
- Contain at least eight (8) alphanumeric characters.
- Contain at least three of the four following character classes:
- Lower case characters
- Upper case characters
- Special characters/symbols
- Passwords can’t contain the user name or parts of the user’s full name, such as first name
网上开户the following password types should be avoided:
- Names of family, pets, friends, etc.
- Birthdays and other personal information such as addresses and phone numbers.
- Word or number patterns like aaabbb, qwerty, 12345678, 123321, etc.
- Any of the above preceded or followed by a digit (e.g., secret1, 1secret)
网上开户password protection standards
- Always use different passwords for DDI accounts from other non-DDI access (e.g., personal ISP account, non-work email, benefits, etc.).
- Always use different passwords for various DDI access needs whenever possible. For example, select one password for systems that use directory services (Active Directory) for authentication and another for locally authenticated access.
- Do not share DDI passwords with anyone, including administrative assistants or secretaries. All passwords are to be treated as sensitive, confidential DDI information.
- Passwords should never be written down or stored on-line without encryption.
- Do not reveal a password in email, chat, or other electronic communication.
- If someone demands a password, refer them to this document and direct them to the Information Security Department.
- Always decline the use of the "Remember Password" feature of applications.
If an account or password compromise is suspected, report the incident to DDI Data Security Office.
Password History, Age, and Lockout Standards
- Password History
- Password must not equal past 15 passwords used.
- Password Age
- Maximum password age equals 90 days.
- Minimum password age equals 1 day.
- Account Lockout threshold equals 3 invalid attempts for system/server-level accounts
- Account Lockout threshold equals 6 invalid attempts for user-level accounts
- Lockout counter resets after 30 minutes
Appendix II - Background Check Policy and Procedure
ddi believes that hiring qualified individuals to fill positions contributes to the overall strategic success of our company. background checks serve as an important part of the selection process at ddi. this type of information is collected as a means of promoting successful candidate matches for the position, as well as a safe and secure work environment for current and future employees. background checks help ddi obtain additional applicant related information that helps determine the applicant's overall employability, ensuring the protection of the current people, property, and information of the organization.
at ddi, background checks are conducted on job applicants in the offer stage of the selection process. ddi will generally use a third-party agency to conduct background checks. the type of information that may be collected by this agency includes, but is not limited to, that pertaining to an individual’s past employment, education, character, finances, reputation, etc.
网上开户all background checks are to be done in compliance with applicable federal and state law, such as the federal fair credit reporting act. for example, the americans with disabilities act prohibits organizations from collecting non- job-related health information from previous employers or other sources. therefore, the only pre-job offer information that can be collected from a prior employer is that pertaining to the quality and quantity of work performed by the applicant, the applicant's attendance record, education, and other issues that can impact the workplace.
网上开户ddi may make inquiries regarding criminal records during the pre-employment stage. consistent with state and federal law we will use this information for job-related issues/purposes. however, if an applicant attempts to withhold information or falsify information, the individual will be disqualified from further employment consideration in any position with the company due to falsification of an application (including termination if this is discovered during employment rather than in the pre-employment process).
网上开户ddi can collect credit information on applicants consistent with the guidelines set forth by the federal fair credit reporting act (fcra). the fair credit reporting act requires organizations to obtain a candidate's written authorization before obtaining a credit report. when doing this, the employer must:
- Certify to the consumer-reporting agency that the employer is in compliance with the FCRA and will not misuse the information it receives.
- Disclose to the applicant or employee, on a separate form, its plans to obtain a consumer or investigative consumer report and that the information received will be used solely for employment purposes.
- Obtain written authorization from the applicant or employee.
- Inform the individual of his or her right to request additional information on the nature of the report and the means through which such information may be obtained.
- Inform the applicant that the report will include information about the individual's character, general reputation, personal characteristics, etc.
- Provide the individual with a summary of his or her rights under the FCRA.
if the results of the credit check are negative, ddi will inform the applicant that it plans on taking adverse action, provide the applicant with a copy of “a summary of your rights under the fair credit reporting act” from the ftc before taking adverse action, provide the applicant the opportunity to review a copy of the credit report (providing the name, address & phone number of the consumer reporting company), a statement that the supplier of the report did not make the adverse employment action decision, and advise the applicant of their rights to dispute inaccurate information furnished by the consumer reporting company. applicants will be granted reasonable time to contest the information (approximately 5 business days).
网上开户background checks may be done at various times for existing employees, such as upon job changes or assignments. employees are to update/advise us of any notable changes regarding their situation, such as driving license restrictions or loss. it also includes felony criminal convictions and, as covered/permitted under state or local law, misdemeanor convictions that may be job related.
网上开户the information from the background check reports will be maintained in a separate confidential file, with actions regarding such information controlled by the vice president of global people services.