Table of Contents. 1.1 Terminology Acronyms Related Documents... 7

Similar documents
STATE OF NEW JERSEY. ASSEMBLY, No th LEGISLATURE. Sponsored by: Assemblywoman ANNETTE QUIJANO District 20 (Union)

SECURITY & PRIVACY DOCUMENTATION

Employee Security Awareness Training Program

3 rd Party Certification of Compliance with MA: 201 CMR 17.00

201 CMR COMPLIANCE CHECKLIST Yes No Reason If No Description

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

The Common Controls Framework BY ADOBE

Oracle Data Cloud ( ODC ) Inbound Security Policies

UT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES

Information Security Policy

Checklist: Credit Union Information Security and Privacy Policies

QuickBooks Online Security White Paper July 2017

COMMENTARY. Information JONES DAY

Morningstar ByAllAccounts Service Security & Privacy Overview

Trust Services Principles and Criteria

University of Pittsburgh Security Assessment Questionnaire (v1.7)

WHITE PAPER- Managed Services Security Practices

Baseline Information Security and Privacy Requirements for Suppliers

A company built on security

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Juniper Vendor Security Requirements

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES

Table of Contents. PCI Information Security Policy

Twilio cloud communications SECURITY

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

Frequently Asked Question Regarding 201 CMR 17.00

ADIENT VENDOR SECURITY STANDARD

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY

INFORMATION SECURITY. One line heading. > One line subheading. A briefing on the information security controls at Computershare

AUTHORITY FOR ELECTRICITY REGULATION

EU Data Protection Agreement

Red Flags/Identity Theft Prevention Policy: Purpose

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

Security Architecture

RADIAN6 SECURITY, PRIVACY, AND ARCHITECTURE

RAPID7 INFORMATION SECURITY. An Overview of Rapid7 s Internal Security Practices and Procedures

Data Security and Privacy Principles IBM Cloud Services

Identity Theft Prevention Policy

An Overview of the Gramm-Leach-Bliley (GLB) Act and the Safeguards Rule

ISSP Network Security Plan

Version 1/2018. GDPR Processor Security Controls

Subject: University Information Technology Resource Security Policy: OUTDATED

Information Technology General Control Review

Sparta Systems TrackWise Digital Solution

I. INFORMATION WE COLLECT

emarketeer Information Security Policy

WORKSHARE SECURITY OVERVIEW

New York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief

VMware vcloud Air SOC 1 Control Matrix

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

Standard CIP Cyber Security Critical Cyber Asset Identification

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd

Acceptable Use Policy

ICT Security Policy. ~ 1 od 21 ~

Protecting your data. EY s approach to data privacy and information security

Lakeshore Technical College Official Policy

Ferrous Metal Transfer Privacy Policy

Standard CIP Cyber Security Critical Cyber Asset Identification

Google Cloud & the General Data Protection Regulation (GDPR)

01.0 Policy Responsibilities and Oversight

PayThankYou LLC Privacy Policy

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

The Honest Advantage

University of Sunderland Business Assurance PCI Security Policy

EXCERPT. NIST Special Publication R1. Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations

TRACKVIA SECURITY OVERVIEW

INFORMATION ASSET MANAGEMENT POLICY

Enterprise Income Verification (EIV) System User Access Authorization Form

The City of Mississauga may install Closed Circuit Television (CCTV) Traffic Monitoring System cameras within the Municipal Road Allowance.

SDR Guide to Complete the SDR

NEW YORK CYBERSECURITY REGULATION COMPLIANCE GUIDE

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard

UTAH VALLEY UNIVERSITY Policies and Procedures

The following security and privacy-related audits and certifications are applicable to the Lime Services:

GM Information Security Controls

Watson Developer Cloud Security Overview

2.4. Target Audience This document is intended to be read by technical staff involved in the procurement of externally hosted solutions for Diageo.

7.16 INFORMATION TECHNOLOGY SECURITY

Customer Proprietary Network Information

FRAMEWORK MAPPING HITRUST CSF V9 TO ISO 27001/27002:2013. Visit us online at Flank.org to learn more.

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers

Google Cloud Platform: Customer Responsibility Matrix. December 2018

Information Security Management Criteria for Our Business Partners

NYDFS Cybersecurity Regulations

Policy Document. PomSec-AllSitesBinder\Policy Docs, CompanyWide\Policy

UCOP Guidelines for Protection of Electronic Personal Information Data and for Security Breach Notification

State of Colorado Cyber Security Policies

Moat Analytics MSA Data Processing Addendum

IBM Security Intelligence on Cloud

Information Security Incident Response Plan

Security Information & Policies

Information Security Incident Response Plan

Cloud FastPath: Highly Secure Data Transfer

FLORIDA S PREHOSPITAL EMERGENCY MEDICAL SERVICES TRACKING & REPORTING SYSTEM

Data Compromise Notice Procedure Summary and Guide

Virginia State University Policies Manual. Title: Information Security Program Policy: 6110

Gramm Leach Bliley Act 15 U.S.C GLBA/HIPAA Information Security Program Committee GLBA, Safeguards Rule Training, Rev.

Transcription:

Information Security Program Company Policy Document Version 1.80 10/20/2017

Table of Contents 1 OVERVIEW... 5 1.1 Terminology... 5 1.2 Acronyms... 7 1.3 Related Documents... 7 2 DUTY TO PROTECT AND STANDARDS FOR PROTECTING PERSONAL INFORMATION (201 CMR 17.03)... 7 2.1 Information Security Program (201 CMR Sec. 17.03.1)... 7 2.2 Compliance Considerations (201 CMR Sec. 17.03.2)... 8 2.3 General InfoSec Program Controls (201 CMR Sec. 17.03.3)... 8 2.3.1 Designated ISP Manager (201 CMR Sec. 17.03.3.1)... 9 2.3.2 Identifying and Assessing Risk (201 CMR Sec 17.03.3.2)... 9 2.3.3 Retaining, Accessing and Transporting Personal Information (201 CMR Sec. 17.03.3.3)... 11 2.3.4 Disciplinary Actions for Violations (201 CMR Sec. 17.03.3.4)... 11 2.3.5 Terminated Employee Access (201 CMR Sec. 17.03.3.5)... 11 2.3.6 Third Party Service Providers (201 CMR Sec. 17.03.3.6)... 12 2.3.7 Amount of Personal Information (201 CMR Sec. 17.03.3.7)... 12 2.3.8 Definition of Records and Devices (201 CMR Sec. 17.03.3.8)... 13 2.3.9 Physical Access (201 CMR Sec. 17.03.3.9)... 13 2.3.10 Monitoring (201 CMR Sec. 17.03.3.10)... 14 2.3.11 Review of Security Measures (201 CMR Sec. 17.03.3.11)... 15 2.3.12 Incident Handling (201 CMR Sec. 17.03.3.12)... 15 3 COMPUTER SYSTEM SECURITY REQUIREMENTS (201 CMR 17.04)... 16 3.1 Authentication Protocols (201 CMR Sec. 17.04.1)... 16 3.1.1 DM Platform Access Authorization... 17 3.1.2 EM Platform Access Authorization... 18 3.2 Access Control (201 CMR Sec. 17.04.2)... 20 3.2.1 Network, Remote, Network Administrator and Database Access Controls... 20 3.2.2 DM Platform Access Control... 21 3.2.3 EM Platform Access Control... 22 3.2.4 Exceptions for Emergency Access... 23 3.3 Encryption of Transmitted Data (201 CMR Sec. 17.04.3)... 23 3.4 Monitoring of Systems (201 CMR Sec. 17.04.4)... 24 3.5 Encryption of Personal Information (201 CMR Sec. 17.04.5)... 25 3.6 Firewall Protection and Operating System Security (201 CMR Sec. 17.04.6)... 26 3.7 System Security Agent Software (201 CMR Sec. 17.04.7)... 27 3.8 Employee Training and Education (201 CMR Sec. 17.04.8)... 27 Certent Company Confidential Page 2

3.8.1 Security Awareness Training Program... 28 3.8.1.1 General Security Awareness Training... 28 3.8.1.2 Targeted Security Awareness Training... 29 3.8.1.3 Phishing Campaigns... 29 4 ADDENDUM... 29 4.1 Physical Security and Protection... 30 4.1.1 Data Center Locations:... 30 4.1.2 Corporate Network Room Description:... 30 4.1.3 Facility Security:... 30 4.1.4 Environmental Protection:... 31 4.1.5 Annual Vendor Review:... 31 4.1.6 Asset Management... 31 4.1.6.1 Hardware Management... 31 4.1.6.2 Software Management... 32 4.2 Network and Application Security... 32 4.2.1 Protection of Data:... 32 4.2.2 Accessibility:... 32 4.2.3 EM Platform Application Security:... 33 4.2.4 Security Related Testing:... 33 4.3 System Protection... 34 4.3.1 Separate Environments:... 34 4.3.2 Data Destruction:... 34 4.3.2.1 Active and Terminated Customers... 34 4.3.2.2 Hardware Maintenance... 35 4.3.2.3 Production Maintenance Disk Replacement:... 35 4.3.3 Disk Destruction Vendor... 35 4.3.4 TCP/IP Ports and Protocols Utilized... 35 4.3.5 Software Escrow Account (Optional)... 36 4.3.6 System Hardening... 36 4.3.6.1 Database Servers... 36 4.3.6.2 Active Directory and Domain Name Service... 36 4.3.6.3 Web, Application and File Servers... 36 4.3.7 Cryptography... 37 4.3.7.1 Cryptography - EM Platform... 37 4.3.7.2 Cryptography - DM Platform... 37 4.3.7.3 SSL Certificate and Key Management... 37 4.3.8 Server Synchronization... 38 4.3.9 Patch Management... 38 Certent Company Confidential Page 3

4.3.9.1 Patch Management - EM Platform... 38 4.3.9.2 Patch Management - DM Platform... 38 4.3.9.3 Corporate, Development and Windows Test Machines... 39 4.4 Availability and Continuity... 39 4.4.1 General Availability... 39 4.4.2 Scheduled Releases... 39 4.4.3 Planned Maintenance... 40 4.4.4 Redundancy and Failover... 40 4.4.5 System Monitoring... 40 4.4.6 EM Platform Activity Auditing... 41 4.4.7 Audit Logs... 41 4.4.8 EM Platform Database Backups... 42 4.4.9 Website Monitoring... 42 4.4.10 Disaster Recovery and Business Continuity... 43 4.4.11 Backup of Data for Restoration... 43 4.4.12 Disaster Recovery - Production Database Server Failure... 44 4.4.13 Disaster Recovery Full Production System Failure... 44 4.4.14 Business Continuity of Certent Offices... 45 4.5 Corporate User Systems... 45 4.5.1 Central Management of Systems... 45 4.5.2 Removable Media... 45 4.5.3 Password Management Policy... 46 4.5.3.1 Network Password Management... 46 4.5.3.2 DM Password Management... 46 4.5.3.3 EM Platform Passwords... 46 4.6 Incident Response Evidence Policy... 47 4.6.1 Evidence Preservation and Extraction... 47 4.6.2 Chain of Custody... 47 4.6.3 Cooperation with Law Enforcement... 47 4.7 Government Requests of Client Data.... 47 Certent Company Confidential Page 4

1 Overview Certent's user-friendly, web-based technology streamlines equity plan management, financial reporting for ASC718, and SEC filings in XBRL and HTML. With technology based on in-depth accounting expertise, an open ecosystem of industry partners, and an expert services organization focused on customer success, Certent has helped more than 1,300 companies worldwide innovate their stock plan and external reporting processes. Certent Equity Compensation Management simplifies and streamlines all the crucial aspects of your stock administration process. Certent improves productivity and tightens compliance with innovative software and a dedicated team of industry experts. Certent Disclosure Management delivers greater control over your financial documents and eliminates manual processes. Data connectors and linking functionality across Word and Excel automate the flow of data. Our rightsourcing model allows you to choose the right level of service for your needs. Certent respects the privacy and security of Customer Data. Certent has implemented several controls to provide sufficient security and protection of Customer data. These controls are reviewed annually by a Third Party as part of a SOC 1 Audit. The sections that follow provide information regarding the security measures employed by Certent to ensure the privacy and availability of data to Certent Customers. The Information Security Program described in this document is specifically intended to address the 201 CMR 17.00 Standards for the Protection of Personal Information of Residents requirements for of the Commonwealth (of Massachusetts). Additional information regarding Physical Security and Protection, Network and Application Security, Protection of Systems and Availability and Continuity is provided in the Addendum of this document. 1.1 Terminology Breach of Security*: The unauthorized acquisition or unauthorized use of unencrypted data or, encrypted electronic data and the confidential process or key that can compromise the security, confidentiality, or integrity of personal information, maintained by a person or agency that creates a substantial risk of identity theft or fraud against a resident of the commonwealth. A good faith but unauthorized acquisition of personal information by a person or agency, or employee or agent thereof, for the lawful purposes of such person or agency, is not a breach of security unless the personal information is used in an unauthorized manner or subject to further unauthorized disclosure. Certent Company Confidential Page 5

Electronic*: Relating to technology having electrical, digital, magnetic, wireless, optical, electromagnetic or similar capabilities. Encrypted*: The transformation of data into a form in which meaning cannot be assigned without the use of a confidential process or key. OWASP Top 10 - A list of the most dangerous security flaws in web applications. The list is considered an industry standard and is compiled by the Open Web Application Security Project. Owns or licenses*: Receives, stores, maintains, processes, or otherwise has access to personal information in connection with the provision of goods or services or in connection with employment. Person*: A natural person, corporation, association, partnership or other legal entity, other than an agency, executive office, department, board, commission, bureau, division or authority of the Commonwealth, or any of its branches, or any political subdivision thereof. Personal information*: A Massachusetts resident's first name and last name or first initial and last name in combination with any one or more of the following data elements that relate to such resident: (a) Social Security number; (b) driver's license number or state-issued identification card number; or (c) financial account number, or credit or debit card number, with or without any required security code, access code, personal identification number or password, that would permit access to a resident s financial account; provided, however, that Personal information shall not include information that is lawfully obtained from publicly available information, or from federal, state or local government records lawfully made available to the general public. Record or Records*: Any material upon which written, drawn, spoken, visual, or electromagnetic information or images are recorded or preserved, regardless of physical form or characteristics. Service Provider*: Any person that receives, stores, maintains, processes, or otherwise is permitted access to personal information through its provision of services directly to a person that is subject to this regulation. User Entity: A Certent Customer contracting with Certent to use the Certent Platform. * - Descriptions as specified in the 201 CMR 17.00 Standard. Certent Company Confidential Page 6

1.2 Acronyms CA CS CSR DM DNS EM ISP MFA PI PII SaaS TTP VM WAS Certificate Authority Customer Support Customer Support Representative Disclosure Management Application Domain Name Service Equity Management Application Information Security Program Multi-Factor Authentication Personal Information Personally Identifiable Information Software as a Service Trusted Third Party Depending on context Virtual Machine or Vulnerability Management Web Application Scan 1.3 Related Documents Certent Acceptable Use Policy Certent Business Continuity/Disaster Plan Certent Incident Management Plan Certent SOC 1 Report for the DM Platform Certent SOC 1 Report for the EM Platform Certent Risk Management Plan 201 CMR 17.00 Standard: 201 CMR 17.00: STANDARDS FOR THE PROTECTION OF PERSONAL INFORMATION OF RESIDENTS OF THE COMMONWEALTH (http://www.mass.gov/ocabr/docs/idtheft/201cmr1700reg.pdf) 2 Duty to Protect and Standards for Protecting Personal Information (201 CMR 17.03) 2.1 Information Security Program (201 CMR Sec. 17.03.1) This section covers the following topics: Every person that owns, licenses, stores or maintains personal information about a resident of the Commonwealth shall develop, implement, maintain and monitor a comprehensive, written information security program applicable to any records containing such personal information. Such comprehensive information security program shall be reasonably consistent with industry standards, and shall contain administrative, technical, and physical safeguards to ensure the security and confidentiality of such records. Moreover, the safeguards contained in such program must be consistent with the safeguards for protection of personal information and information of a similar character set forth in any state or federal regulations by which Certent Company Confidential Page 7

the person who owns, licenses, stores or maintains such information may be regulated. * - Descriptions as specified in the 201 CMR 17.00 Standard This Information Security Program is intended to minimally address the requirements of 201 CMR 17.00. 2.2 Compliance Considerations (201 CMR Sec. 17.03.2) This section covers the following topics: Whether the comprehensive information security program is in compliance with these regulations for the protection of personal information, whether pursuant to section 17.03 or 17.04 hereof, shall be evaluated taking into account: (a) the size, scope and type of business of the person obligated to safeguard the personal information under such comprehensive information security program; (b) the amount of resources available to such person; (c) the amount of stored data; and (d) the need for security and confidentiality of both consumer and employee information.* - Descriptions as specified in the 201 CMR 17.00 Standard Evaluation of Certent s compliance with 201 CMR 17.00 should be considered in light of the following: Size, Scope and Type of Business: Certent currently has approximately 180 Employees and provides Software-as-a-Service applications available over the internet in support of Equity and Disclosure Management. Amount of Resources Available: Part of Certent s SaaS offering is a commitment to provide enough storage capacity to support the Customer s data requirements. Amount of Stored Data: Certent provides a structure for storing data typically required for equity and disclosure management. The volume of data is Customer dependent. Need for Security and Confidentiality: Certent respects the privacy and security of Customer Data and has implemented several controls to provide sufficient security and protection to Customer data. Customers are in control of what, if any, personal identifiers and level of personal information they decide to store in the Certent platform, except when required for the application to perform its function. Every attempt is made to ensure the security and privacy of Customer data as described in this document. 2.3 General InfoSec Program Controls (201 CMR Sec. 17.03.3) The sections below describe the core information security controls in place at Certent in support of 201 CMR 17.00 Certent Company Confidential Page 8

2.3.1 Designated ISP Manager (201 CMR Sec. 17.03.3.1) This section covers the following topics: Designating one or more employees to maintain the comprehensive information security program. * * - Descriptions as specified in the 201 CMR 17.00 Standard Certent s designated ISP Manager is Vasanth Madhure. Vasanth is the Vice President of Technical Operations and Information Security. He has overall responsibility for InfoSec and Compliance 2.3.2 Identifying and Assessing Risk (201 CMR Sec 17.03.3.2) This section covers the following topics: Identifying and assessing reasonably foreseeable internal and external risks to the security, confidentiality, and/or integrity of any electronic, paper or other records containing personal information, and evaluating and improving, where necessary, the effectiveness of the current safeguards for limiting such risks, including but not limited to: a. ongoing employee (including temporary and contract employee) training; b. employee compliance with policies and procedures; and c. means for detecting and preventing security system failures.* * - Descriptions as specified in the 201 CMR 17.00 Standard Certent's risk assessment process involves weekly management meetings to identify and monitor risks related to the Certent Platform. For any significant risks identified, management implements the appropriate measures to monitor and manage the risks. In addition, recurring risk management meetings are held involving all functional teams within Certent. Strategic issues affecting the overall business are presented and reviewed by the functional managers. The status of any outstanding risk is reviewed and new risks are assigned an owner, prioritized and the management of the risks are discussed and agreed to. In addition, training requirements, employee compliance and potential security risks are reviewed, at a minimum, annually in conjunction with the SOC 1 Audits. Improvements to controls and the overall Information Security Program are considered and implemented as appropriate to ensure proper security of data in support of the audit and secure data business practices. More specifically: Background Checks: Certent performs background checks as described below: Certent Company Confidential Page 9

Permanent and Temporary Employees, Interns, Contractors, Consultants: Social Security Number Verification (SSNV) Social Security Fraud Detection National Sex Offender Registry Search 7-year criminal check (Checks all residences included in SSNV results. Includes all felonies and misdemeanors held in felony court) Employment Verification (last 5 years for up to 3 employers) Education Verification (highest level attained) Any employee or temp who accesses Customer data including Customer Support, IT and Quality Assurance have an OFAC check (Office of Foreign Assets Control checks for association with Terrorism - http://www.treasury.gov/about/organizational-structure/offices/pages/office-of- Foreign-Assets-Control.aspx All professional references are checked. Partner Employees: Certent does not perform background checks, but encourages the partner company to perform the appropriate checks. Ongoing Employee Training: All Certent employees are required to read the Certent Employee Handbook and to sign a confidentiality agreement when they are hired. The Handbook and Agreement stipulate that employees treat any Third-Party information confidential and proprietary and not disclose it to any person, firm or corporation or use it except as necessary in carrying out their work for Certent and the Third Party. All employees are required to attend Security Awareness Training annually. Certent employees are also encouraged to review the Certent SOC 1 Reports and Information Security Program (this document) annually. The SOC 1 Reports documents the process for authorizing access to customer data which the SOC 1 Audit verifies. Employee Compliance with Policies and Procedures: Certent is not authorized to provide access to User Entity data without a proper request from an authorized User Entity contact. The relevant annual SOC 1 Audit is used to verify access was granted per procedure. Once the Security Admin access is provided to the Customer, the Customer is responsible for authorizing and providing access to User Entity users desiring access to the Certent Platform. Means for Detecting and Preventing Security System Failures: Means of monitoring for unauthorized access to Customer data include the vulnerability management scans, threat management and intrusion protection that is reviewed on a weekly basis and additionally sends alerts to the TechOps Certent Company Confidential Page 10

Team if attacks are detected. Refer to the Computer System Security Requirements Section below from more detailed information. 2.3.3 Retaining, Accessing and Transporting Personal Information (201 CMR Sec. 17.03.3.3) This section covers the following topics: Developing security policies for employees that take into account whether and how employees should be allowed to keep, access and transport records containing personal information outside of business premises. * * - Descriptions as specified in the 201 CMR 17.00 Standard The Certent Platform is a SaaS offering where User Entities and authorized Certent employees access User Entity data via the internet. The data is accessible via the Certent Platform via a browser utilizing HTTPS. Certent employees do not maintain or transport records containing personal information offsite. Refer to the Computer System Security Requirements Section of this document for more information regarding the authentication, access control and encryption of data. 2.3.4 Disciplinary Actions for Violations (201 CMR Sec. 17.03.3.4) This section covers the following topics: Imposing disciplinary measures for violations of the comprehensive information security program rules. * * - Descriptions as specified in the 201 CMR 17.00 Standard Violations of the Information Security Program requirements are reviewed by the Certent Management team. Appropriate disciplinary action, including dismissal of the employee, is taken based on the seriousness of the situation. 2.3.5 Terminated Employee Access (201 CMR Sec. 17.03.3.5) This section covers the following topics: Preventing terminated employees from accessing records containing personal information by immediately terminating their physical and electronic access to such records, including deactivating their passwords and user names. * * - Descriptions as specified in the 201 CMR 17.00 Standard Access to the Certent Network and Facilities is removed immediately for terminated employees. Facility and Network Access Authorization Forms with Certent Company Confidential Page 11

appropriate approvals are required for initial access when employees are hired. Upon termination, HR creates a helpdesk ticket to track the term process. The TechOps group is responsible for collecting or disabling key cards, disabling access to the Certent network and resources. If the employee worked from a corporate office, the data and voice ports are disabled at the switch to reduce risk of rouge devices being plugged in behind corporate firewalls. 2.3.6 Third Party Service Providers (201 CMR Sec. 17.03.3.6) This section covers the following topics: Taking all reasonable steps to verify that any third-party service provider with access to personal information has the capacity to protect such personal information in the manner provided for in 201 CMR 17.00; and taking all reasonable steps to ensure that such Third-Party service provider is applying to such personal information protective security measures at least as stringent as those required to be applied to personal information under 201 CMR 17.00. * * - Descriptions as specified in the 201 CMR 17.00 Standard Third Parties that require access to the Certent Platform are only granted access if agreed to by the Customer. Third parties may optionally contract directly with Customers and are bound by the Customer/Third Party Agreement put in place. Third Parties may also be engaged by Certent, with disclosure to the Customer, and are bound by the Master Service Agreement in place between Certent and the Third Party. Certent Third Party Service Providers are required to sign a Master Service Agreement, which includes a Confidential Information section, before engaging in business with Certent. Certent also makes available the Certent SOC 1 Report as well as the Certent Information Security Program document (this document) to all Third Parties it partners with so they are familiar with their obligations regarding the security and privacy of Customer data. Certent performs annual reviews of User Considerations as specified in Third Party Service Providers SOC 1 Reports. Certent takes appropriate steps to mitigate any risk associated with the User Considerations. 2.3.7 Amount of Personal Information (201 CMR Sec. 17.03.3.7) This section covers the following topics: Limiting the amount of personal information collected to that reasonably necessary to accomplish the legitimate purpose for which it is collected; limiting the time such information is retained to that reasonably necessary to accomplish such purpose; and limiting access to those persons who are reasonably required to know such information Certent Company Confidential Page 12

in order to accomplish such purpose or to comply with state or federal record retention requirements. * * - Descriptions as specified in the 201 CMR 17.00 Standard Certent provides robust platforms for Equity Compensation and Disclosure Management based on industry standards and requirements. Customers are in control of what, if any, personal identifiers and level of personal information they decide to store in the Certent platform, except when required for the application to perform its function. Retention of information in the Certent Platform for active Customers is up to the Customer. Upon termination, Customer information is removed from the production database 90 days after termination and from backup disk 365 days after that unless agreed to otherwise. Access to Customer information requires approval by the Customer and is limited to authorized users. 2.3.8 Definition of Records and Devices (201 CMR Sec. 17.03.3.8) This section covers the following topics: Identifying paper, electronic and other records, computing systems, and storage media, including laptops and portable devices used to store personal information, to determine which records contain personal information, except where the comprehensive information security program provides for the handling of all records as if they all contained personal information. * * - Descriptions as specified in the 201 CMR 17.00 Standard Customer Data and personal information can be stored on the Certent Platform and the Certent FTP site. All access to Customer data is performed via the Certent Platform using a browser with HTTPS or file transfers using FTPS. The Certent Platform does not require the use of laptops or portable devices for accessing or managing Customer data. However, in the event Certent Support needs to store Customer data on a laptop at the Customer s request, all laptops are encrypted. Storage of data on portable devices other than laptops is not allowed. 2.3.9 Physical Access (201 CMR Sec. 17.03.3.9) This section covers the following topics: Reasonable restrictions upon physical access to records containing personal information, including a written procedure that sets forth the manner in which physical access to such records is restricted; and storage of such records and data in locked facilities, storage areas or containers. * * - Descriptions as specified in the 201 CMR 17.00 Standard Certent Company Confidential Page 13

The Certent Platform is a SaaS offering where User Entities and authorized Certent employees access User Entity data via the internet. The data is accessible via the Certent Platform using a browser with HTTPS. As such, physical records containing personal information are not generally maintained. However, in the event Certent Support needs to utilize hardcopy of Customer data at the Customer s request, documents are kept only long enough to complete the task and hand. Documents are locked when the employee leaves their desk. Any document containing client information is discarded into locked boxes for shredding in accordance with the Certent Acceptable Use Policy. Certent uses a contracted third-party vendor to securely destroy documents using cross cut shredding to ensure client data privacy. 2.3.10 Monitoring (201 CMR Sec. 17.03.3.10) This section covers the following topics: Regular monitoring to ensure that the comprehensive information security program is operating in a manner reasonably calculated to prevent unauthorized access to or unauthorized use of personal information; and upgrading information safeguards as necessary to limit risks.* * - Descriptions as specified in the 201 CMR 17.00 Standard Certent Customer Support is primarily responsible for ensuring access to Customer data is authorized. To authorize User Entity access, the authorized User Entity contact emails the Certent Customer Support Representative (CSR). A Certent CSR verifies the request is valid, sets up the user entity access and provides a logon ID and temporary password to the requesting user. A Certent CSR is not authorized to provide access to User Entity data without a proper request from an authorized User Entity contact. The annual SOC 1 Audit is used to verify access was granted per procedure. The Support Organization reviews employee access to the EM platform on a quarterly basis. Additionally, an Access Log is maintained documenting Certent employee network, EM and DM platform, office and Colocation access. The Director of TechOps reviews the log at least annually to verify the access is restricted to authorized personnel. Access reviews of Co-location data centers conducted at least quarterly, by the Director of Tech Ops or InfoSec and Compliance Manager. Other means of monitoring for unauthorized access to Customer data include the vulnerability management scans, threat management and intrusion protection that is reviewed on a weekly basis and additionally sends alerts to the TechOps Team if attacks are detected. Refer to the Computer System Security Requirements Section below from more detailed information. Certent Company Confidential Page 14

The overall Information Security Program is reviewed on an ongoing basis. Upgrades to information and privacy safeguards may be initiated by as business needs change, industry trends evolve, or new threats emerge. However, all security program policies and documents are reviewed and at least annually as part of the SOC 1 Audit. Changes to controls are considered and implemented as appropriate to ensure proper security of data. changes in business practices, changes to infrastructure item configuration and/or Vendors as well as emerging threats, and by issues or concerns raised by Customers and Prospective Customers. 2.3.11 Review of Security Measures (201 CMR Sec. 17.03.3.11) This section covers the following topics: Reviewing the scope of the security measures at least annually or whenever there is a material change in business practices that may reasonably implicate the security or integrity of records containing personal information. * * - Descriptions as specified in the 201 CMR 17.00 Standard Certent performs a review of the Information Security Program minimally in conjunction with the SOC 1 Audit. The SOC 1 Audit covers a twelve-month period. In addition, the Information Security Program is reviewed as needed when changes occur due to changes in business practices, infrastructure item configuration and/or Vendors as well as issues or concerns raised by Customers and Prospective Customers. 2.3.12 Incident Handling (201 CMR Sec. 17.03.3.12) This section covers the following topics: Documenting responsive actions taken in connection with any incident involving a breach of security, and mandatory post-incident review of events and actions taken, if any, to make changes in business practices relating to protection of personal information. * * - Descriptions as specified in the 201 CMR 17.00 Standard If access to Customer data is confirmed to be breached beyond the Customer and Certent, the following actions are performed by Certent as documented in the Certent Data Security Incident Management Policy: 1. Immediately resolve the breach by removing, locking and/or blocking inappropriate access to re-institute security to Customer confidential data. 2. Notify the Customer of the unauthorized access to confidential data including PII and/or Customer proprietary data as soon as practicable (target of 1 Certent Company Confidential Page 15

business day) unless prevented from doing so by a law enforcement or regulatory agency. Notification will be via email and phone. 3. Determine the extent of the breach by reviewing the Certent Platform and audit logs for evidence of log-ins, changes and deletions of data. 4. Provide the Customer with a summary of the extent of the security breach within 24 hours after the remediation of the breach. 5. Assist the Customer where possible in the development and execution of a plan to resolve any additional issues or concerns. 6. Review processes and controls to prevent similar incidents in the future. 3 Computer System Security Requirements (201 CMR 17.04) 3.1 Authentication Protocols (201 CMR Sec. 17.04.1) This section covers the following topics: Control of user IDs and other identifiers. * Reasonably secure method of assigning and selecting passwords, or use of unique identifier technologies, such as biometrics or token devices. * Control of data security passwords to ensure that such passwords are kept in a location and/or format that does not compromise the security of the data they protect. * Restricting access to active users and active user accounts only. * Blocking access to user identification after multiple unsuccessful attempts to gain access or the limitation placed on access for the particular system. * * - Descriptions as specified in the 201 CMR 17.00 Standard Certent has created access levels to appropriately restrict access to systems and data by Certent personnel. The various types of access available to Certent personnel is listed below. Certent will only grant access to a specific named user. Access credentials should never be shared, and should only be used in accordance with the Acceptable Use Policy. DM Platform User: A company level role which allows a Certent employee to access only the data of the company profile for which the role was granted. Requires approval from Support Management, or Director of TechOps DM Platform Administrator: Administrator level access to the EM Platform provided to Certent Customer Support. Requires approval from Support Management, or Director of TechOps EM Platform User: Access provided to user entities and Certent employees, to access equity compensation data. Requires approval from Support Management, or Director of TechOps EM Platform System Administrator: Administrator level access to the EM Platform provided to Certent Customer Support. Requires approval from Support Management, or Director of TechOps Certent Company Confidential Page 16

Network: Basic network access to the corporate network for performing regular duties (e.g., email, internet, shared file access) provided to all Certent employees. Access is given to employees by default. VPN: Virtual Private Network required for remotely accessing Certent systems. Access is given to employees by default. Network Administrator: Administrator level access to the Certent Corporate and Colocation Networks provided to the TechOps Team only. Requires SVP Engineering or Director of TechOps approval. Database Administrator (DBA): Administrator level access to the EM platform database is provided only to approved members of the TechOps Team. Requires SVP Engineering or Director of TechOps approval. 3.1.1 DM Platform Access Authorization The access authorization process implemented for the DM Platform is described below: Certent Personnel Access Authorization Certent personnel who require access to the DM platform are required to have a formal either Administrator or User roles based on their position. Certent employees do not have access to customer profiles in t h e DM platform u n t i l assigned access. Support Services is responsible for granting Certent employee access to customer profiles in DM once the employee is assigned to specific customers and approved by his or her manager. Certent Personnel Access Disablement/Deletion When Certent employees are terminated, HR initiates the Employee Termination process by notifying Support Services and TechOps personnel to revoke the employee's logical access to Certent systems, including DM, e- mail, CRM system, and training resources. Termination notifications are sent via e-mail to all relevant departments to authorize and track revocation of both logical and physical access to Certent facilities, devices, and systems. TechOps personnel verify that network and building access has been removed within a day of notification. Service and Support verify that DM access is removed within a day of notification. User Entity Certent DM Platform Access Authorization For customer access, the assigned Account Manager at Certent works with the customer to determine the appropriate customer access required and communicate the required access to Sales Operations ("Sales Ops"). For customer access requests, Sales Ops either e-mails Support Services or submits a support case through the CRM system requesting that the access be set up. If customers contact Support Services directly, Support Services validates the appropriateness of the customer's request with Sales Ops prior to granting c u s t o m e r s a c c e s s. Once the access has been set up and a Certent Company Confidential Page 17

password has been automatically generated by the DM Platform. The DM platform automatically sends an e -mail to the new user with the l o g i n information. Certent employee access to customers in the DM Platform and customer access to DM is set up by Support Services, based on approval from authorized individuals, and is documented in the CRM system. User Entity Certent DM Platform Access Disablement/Deletion Customer requests for access removal are tracked in a support case. Once a case is received, Support Services removes the appropriate access and updates the support case. The client is automatically notified through the case. Customer access is removed from the DM platform within one day of the customer request. DM Platform User Access Reviews Support Services performs a quarterly review of employee access to DM platform. The review confirms that access remains authorized and appropriate. 3.1.2 EM Platform Access Authorization The access authorization process implemented for the EM Platform is described below: Certent Personnel Access Authorization To authorize administrator access to the network, the Certent Platform or the Certent Platform database, first the hiring manager submits a request. The Director of TechOps completes and signs the Access Authorization Form. If the hiring manager is the Director of TechOps, a secondary approval is not required. The Network Administrator sets up the access as authorized. Network administrator and the Certent Platform database administrator access are restricted to authorized personnel. Access to the system administrator role within the Certent Platform is restricted to the Service and Support and Quality Assurance. Any Certent employee in production support role requires administrator access to the Certent Platform and database. Certent Personnel Access Disablement/Deletion When employees terminate, the Office Manager notifies the TechOps Team to disable/delete the terminated employee s access, as applicable. The TechOps Team disables/deletes the terminated employee s access and notifies the Office Manager. The TechOps Team completes and signs the termination portion of the Access Authorization Form to acknowledge that the terminated employee s access was disabled/deleted. User List Review The Director of TechOps reviews the network, remote, Certent Platform system administrator, network administrator, and Certent Platform database user access lists annually to verify that the access is restricted to authorized personnel. The Certent Company Confidential Page 18

Director of TechOps signs the User Access Audit Log to evidence the review performed. Network To authorize network, or remote access (as applicable), the Director of TechOps, TechOps Team, or hiring manager completes and signs the Access Authorization Form. The Network Administrator sets up the access as authorized. User Entity Certent EM Platform Access Authorization The Certent Service and Support and Quality Assurance are by default provided with stock option administrator (SOA) access as well as security/group administrator access to user entity level stock option system functions. Each user entity assumes responsibility for setting up and maintaining access within its own organization by requesting the Certent Service and Support Group to set up security/group administrator access for the entity. The user entity personnel with security/group administrator access are then responsible for the creation of SOA and lower roles for the given user entity. The security administrator and group administrator level access provides the user the ability to: 1. Add new users 2. Update user information 3. Grant additional user roles 4. Delete users 5. Unlock user access 6. Reset user passwords To authorize new or additional user entity security administrator or group administrator access, the authorized user entity representative emails the Certent Service and Support Group. An Certent Service and Support Group member with the Certent Platform system administrator access sets up the user entity s security administrator or group administrator access and provides a logon ID and temporary password to the user entity personnel with the security/group administrator access via a telephone call. User Entity Certent EM Platform Access Disablement/Deletion To delete a user entity s security administrator or group administrator access, the authorized user entity representative or Corporate Officer notifies the Certent Service and Support Group. Upon notification, a Certent Services and Support Group member deletes the security administrator or group administrator access and confirms to the user entity by email or updating the CRM request that the Certent Platform access was deleted. The end user access for user entity users is deleted by the respective user entity personnel with the security/group administrator access. Certent Company Confidential Page 19

3.2 Access Control (201 CMR Sec. 17.04.2) This section covers the following topics: Restrict access to records and files containing personal information to those who need such information to perform their job duties. * Assign unique identifications plus passwords, which are not vendor supplied default passwords, to each person with computer access, that are reasonably designed to maintain the integrity of the security of the access controls. * * - Descriptions as specified in the 201 CMR 17.00 Standard 3.2.1 Network, Remote, Network Administrator and Database Access Controls Corporate Network and remote access is restricted to authorized Certent personnel via local LAN or remote Virtual Private Network (VPN). Measures are in place to ensure network traffic is secure from Bridging, Multi-Homing, or Split Tunneling. To authenticate to a Certent corporate network requires a user to enter valid credentials. Remote and wireless VPN access requires MFA. User specific logins and passwords are utilized on all systems on the Network Password security parameters for the corporate network include the following requirements: Minimum password length 12 characters Password expiration 45 days Password history is maintained for 24 passwords Password complexity enabled Resets Allowed: Once per 24 hour period. Account lockout after 5 unsuccessful logon attempts with an automatic 30- minute reset. Production Production access is restricted to authorized Certent personnel via Virtual Private Network (VPN) and requires multi-factor authentication. User specific logins and passwords are utilized on all systems on the Network. Measures are in place to ensure network traffic is secure from Bridging, Multi-Homing, or Split Tunneling Password security parameters for the corporate network include the following requirements: Minimum password length 12 characters Password expiration 45 days Password history is maintained for 24 passwords Certent Company Confidential Page 20

Password complexity enabled Resets Allowed: Once per 24 hour period. Account lockout after 5 unsuccessful logon attempts with an automatic 30- minute reset. Network and Database Administration Network administrator access is restricted to the TechOps Team. Network Administrators are required to use a normal network account (non-distinguishable) from their Administrator access for all non-administrative activity. Direct access to Certent Platform databases is restricted to the Database Administrators Team and requires multifactor authentication to log into the production environment. DBA s are required to sudo into Linux servers so that an audit trail can be maintained. 3.2.2 DM Platform Access Control Password security parameters for the Certent DM Platform include the following requirements: Minimum password length 8 alphanumeric characters Password complexity Requires uppercase characters, lowercase characters, and numbers. Password expiration 30 days Password history is maintained for 24 passwords Idle session time out Set by the client and the company level. Account lockout after 6 unsuccessful log on attempts with an administrator reset required. First login requires password change. To access data provided by DM Excel customers via Secure File Transfer Protocol ("SFTP") users need domain administrator access. Domain administrator access is limited to TechOps personnel. The DM platform a l l o w s users to be set up as the administrator r o le ("Admin"). The Admin can add and remove user access to the DM platform. Certent personnel are granted the admin role upon authorized approval. DM Admin access is limited to authorized personnel. DM access is systematically enforced through group permissions and program logic. All Certent Customers access the same servers and all Customer data is stored in a single database instance (multi-tenant). Customer information is logically separated using a unique Customer identifier and access to Customer information is further protected based on roles. All data is encrypted using a Customer specific key. Access to the Certent DM Platform requires a user to enter a unique user ID and confidential password. Certent utilizes single-factor Certent Company Confidential Page 21

authentication with strong passwords as described previously. A user may access only the data for the company for which the user has been given access by Certent. 3.2.3 EM Platform Access Control The Certent EM Platform is a SaaS offering where User Entities and authorized Certent employees access User Entity data via the internet. The data is accessible via the Certent EM Platform using a browser with HTTPS. Data can also be imported to the Certent EM database and output reports obtained using a Secure FTP Client (e.g., CuteFTP). The Certent EM Platform access is restricted to authorized Certent personnel and users authorized by the user entity. The Certent EM Platform system administrator access is restricted to the Certent Service and Support and Quality Assurance. Access to the Certent EM Platform requires a user to enter a user ID and password. Password security parameters for the Certent EM Platform include the following requirements: Minimum password length 10 alphanumeric characters Password complexity Requires three of the following four: uppercase characters, lowercase characters, numbers, special characters. Password expiration 45 days Password history is maintained for 24 passwords Idle session time out 45 minutes of inactivity Account lockout after 5 unsuccessful log-on attempts with an administrator reset required. Upon successful logon, users are provided access to a drop-down list of companies for which the user has access. The user can only access company data to which they have been provided access. Passwords are encrypted in the database using an Oracle encryption algorithm scheme using AES256. All Certent Customers access the same servers and all Customer data is stored in a single database instance (multi-tenant). Customer information is logically separated using a unique Customer identifier and access to Customer information is further protected based on roles. Data encrypted includes User Passwords, Tax IDs and Broker Account Numbers. Access to the Certent EM Platform requires a user to enter a unique user ID and confidential password. Certent utilizes single-factor authentication with strong passwords as described previously. A user may access only the data for the company or companies for which the user has been given access by Certent. After authenticating a user, Certent validates the user s access permissions. Certent then displays a series of pages and allows the user to select the role and Certent Company Confidential Page 22

company to access based on the access configured by Certent Customer Support. Authentication is re-validated on each page refresh per session variables. All page transitions are logged. 3.2.4 Exceptions for Emergency Access The processes and controls outlined in section 3.2 govern the accesses Certent provides employees to controlled resources, platforms and Production environments. This section outlines the exception process in place for granting emergency access authorization for trouble shooting. If emergency access to a non-authorized employee is required, the following process shall be followed: Email or help desk ticket is created to initiate the request. o If not initially made in a help desk ticket, the email chain will be transferred to the helpdesk for tracking. The authenticity of the request will be confirmed through a phone call, IM, or manager, director, or VP confirmation. The request must include the business reason for the need. Emergency authorization to access to the Production network, EM or DM platforms must be authorized by the Director of TechOps, or a member of the executive management team. If approved, the access will be granted for a time not to exceed 7 business days without further review and approval. The TechOps team is responsible for tracking the access and updating the ticket if the access should require early revocation. 3.3 Encryption of Transmitted Data (201 CMR Sec. 17.04.3) This section covers the following topic: Encryption of all transmitted records and files containing personal information that will travel across public networks, and encryption of all data containing personal information to be transmitted wirelessly. * * - Descriptions as specified in the 201 CMR 17.00 Standard Wireless Access: There is no wireless access to the Certent production system. Wireless connections in the corporate offices are segregated from the corporate network. Protection of Data via Browser Access by User Entities: To protect against disclosure to third parties, the above website transmits data utilizing Hypertext Transfer Protocol Secure (HTTPS) using Secure Socket Layer (SSL) encryption which utilizes 256-bit encryption when communicating with Certent Company Confidential Page 23

Internet browsers. In addition, Certent uses trusted certificate authorities to assure user entities that the Certent Web Applications are authentic. Protection of Data via File Transfer by User Entities: Customers can transfer Customer data to Certent as follows: EM Platform: Customers can bulk import data into the Certent database using templates provided by Certent. Files being transferred to the system for upload can be optionally encrypted using PGP encryption and then transferred using Secure FTP. The import process requires that Customers use Secure FTP software (FTPs), such as the Globalscape CuteFTP product, to transfer files from their company to the Certent FTP site. Once the files have been transferred securely, they are automatically imported into the Certent database. Customers use the Certent Importer console to view the status of their data import activity. DM Platform: Customers can transfer data to the Certent Platform for access by Customer Support as need to support Customer requests. The import process requires that Customers use Secure FTP software (FTPs), such as the Globalscape CuteFTP product, to transfer files from their company to the Certent FTP site. Protection of Data Transferred by Certent Employees: Certent employees have access to the Certent Network and Certent Platform as described in the Access Control Section of this document. The primary activities engaged in by Certent employees is accessing data and performing backups of data. Certent CS has access to User Entity data via the Certent Platform using a browser with HTTPS in the same manner as User Entities. Data files containing Customer data are made available to Customers by Certent CSRs via the FTP site. Backups of the production database at the PHX Colocation facility are written to backup disk. Disk backups are encrypted using 256 bit AES software encryption. Database backups are also copied nightly over the network (via VPN) from the PHX Colocation to the SAC Colocation where it is stored on disk. 3.4 Monitoring of Systems (201 CMR Sec. 17.04.4) This section covers the following topics: Reasonable monitoring of systems for unauthorized use of or access to personal information. * Certent Company Confidential Page 24