Information Security

Compliance Policies

Complete information security policy documentation for SafeRedact. All policies are maintained under Cambridge Holdings, LLC and reviewed annually.

Version 1.0 — Effective March 16, 2026 — 13 documents

GDPR & CCPA

Download All Policies

Complete policy pack — 13 documents (.docx)

Download ZIP

Core ISMS

Information Security Policy (ISMS)
Master ISMS policy — scope, objectives, risk framework, roles & governance
Risk Assessment and Treatment
Risk methodology, 5×5 scoring matrix, treatment options, risk register

Access & Operations

Access Control
Least privilege, MFA, password policy, API key management, account lifecycle
Incident Response
Severity classification, response phases, breach notification timelines (72hr GDPR)
Change Management
Standard/normal/emergency changes, deployment pipeline, detection engine controls

Vendors & Data

Vendor and Supplier Management
Anthropic, Vercel, Supabase, Stripe assessments — DPA requirements
Data Classification and Handling
4-tier classification, zero-storage architecture, retention schedules, disposal

Continuity & Operations

Business Continuity and Disaster Recovery
RTO/RPO targets, dependency mapping, restoration priority, annual testing
Acceptable Use
Permitted activities, prohibited actions, workstation security, monitoring

Technical Controls

Cryptography and Key Management
Approved algorithms, key storage, rotation schedules, certificate management
Logging, Monitoring, and Audit
Event logging, retention periods, continuous monitoring, alerting, internal audits

Privacy & People

Privacy and Data Protection
GDPR/CCPA compliance, data subject rights, international transfers, privacy by design
Human Resources Security
Background screening, security training, termination procedures, contractor access

Related Legal Documents

Data Processing Agreements and security architecture documentation.