Terms and Conditions
1. Introduction
These Terms and Conditions (“Terms”) govern your use of U Scope Technologies’ services and systems. By accessing or using our services, you agree to comply with and be bound by these Terms.
2. Security Organization and Management
U Scope Technologies maintains a structured Information Security Program overseen by a Risk Committee. The Risk Committee ensures adherence to this program, performs annual risk assessments, and oversees data handling responsibilities.
3. Risk Management
U Scope Technologies conducts an annual risk assessment to identify and mitigate risks associated with its systems and services. Results are documented and integrated into business processes.
4. Employee and Vendor Responsibilities
• Employees and Consultants: Must adhere to data protection policies and report non-compliance.
• Vendors and Contractors: Must avoid altering standards that protect customer data, complete due diligence, and notify U Scope Technologies of any policy violations.
5. Confidentiality and Background Checks
Employees are required to sign confidentiality agreements and undergo background checks before accessing U Scope Technologies’ systems. Security awareness training is mandatory within 30 days of hire and annually thereafter.
6. Access Control
Access to U Scope Technologies’ systems is restricted to authorized personnel based on their roles. The principle of least privilege is enforced, and multi-factor authentication (MFA) is required for system access.
7. Data Handling and Retention
U Scope Technologies classifies data as Sensitive, Confidential, or Public. Data is retained only as long as necessary and securely disposed of when no longer needed. Sensitive and Confidential data is encrypted both in transit and at rest.
8. Incident Management
U Scope Technologies has procedures for identifying, managing, and resolving privacy incidents in accordance with its Incident Management Policy.
9. Vulnerability and Patch Management
U Scope Technologies conducts regular vulnerability scans and penetration tests. Identified vulnerabilities are remediated based on their risk level, and patches are applied within specified timelines to maintain system security.
10. Changes to Terms
U Scope Technologies may update these Terms periodically. Continued use of our services constitutes acceptance of the revised Terms.
11. Contact Information
For any questions or concerns regarding these Terms, please contact U Scope Technologies’ support team.
These Terms and Conditions are derived from the policies outlined in the Information Security Policy document provided by U Scope Technologies. Ensure to tailor and review them further to align with any additional legal or operational requirements specific to your organization.