Xoxoday
Ctrlk
  • πŸ““User Resources
    • πŸ‘¨β€πŸ’ΌFor Admins
      • πŸ“ŒGetting Started
      • πŸš€Plum Launch Communication Kit
      • Xoxo Points
      • Xoxo Codes
      • Points vs Codes
      • Xoxo Links
      • Domain Authentication Guide
      • πŸ’°Add Funds
      • Campaigns
      • 🏬Reports
      • πŸ’³Prepaid Card User Guide
      • πŸ”Security and Compliance
        • Cryptography & Encryption
        • Email Whitelisting
        • Governance, Risk, & Data Compliance
        • Application,Dev & Security
        • Cloud Security
        • HR Compliance
        • Identity & Access Management
        • Solution Development
        • Security Operations
        • Training and Awareness
        • Vulnerability and Threat Management
        • Security Operations & Technical Capabilities and Support
        • Data Management
        • Policies & Procedures
        • Tax Compliance
        • Privacy Compliance
        • Cloud Security Alliance
        • Others
        • Documents
          • Data Security
          • Information Security
          • Admin/Business
          • Others
          • Finance Compliance
    • πŸ§‘β€πŸ€β€πŸ§‘For End-Users
    • πŸ”—Pre-Built Integrations
    • πŸ›£οΈProduct Roadmap
  • πŸ‘¨β€πŸ’»Developer Resources
  • πŸ“…Release Notes
Powered by GitBook
On this page
  1. πŸ““User Resources
  2. πŸ‘¨β€πŸ’ΌFor Admins
  3. πŸ”Security and Compliance
  4. Documents

Data Security

1.Data Protection Policy

2.Data Security Policy

3.Personal Identifiable Information (PII) Policy

4. Anonymization and Pseudonymization Policy

5.Data Retention and Disposal Policy

6.Data Subject Access Right Procedure

7.Data Breach Notification Procedure

8.Data Breach Notification Template

PreviousDocumentsNextInformation Security

Last updated 4 years ago

Was this helpful?

  • 1.Data Protection Policy
  • 2.Data Security Policy
  • 3.Personal Identifiable Information (PII) Policy
  • 4. Anonymization and Pseudonymization Policy
  • 5.Data Retention and Disposal Policy
  • 6.Data Subject Access Right Procedure
  • 7.Data Breach Notification Procedure
  • 8.Data Breach Notification Template

Was this helpful?