Xoxoday
search
⌘Ctrlk
Xoxoday
  • πŸ““User Resources
    • πŸ‘¨β€πŸ’ΌFor Admins
      • πŸ“ŒGetting Started
      • πŸš€Plum Launch Communication Kit
      • Xoxo Points
      • Xoxo Codes
      • Points vs Codes
      • Xoxo Links
      • Domain Authentication Guide
      • πŸ’°Add Funds
      • Campaigns
      • 🏬Reports
      • πŸ’³Prepaid Card User Guide
      • πŸ”Security and Compliance
        • Cryptography & Encryption
        • Email Whitelisting
        • Governance, Risk, & Data Compliance
        • Application,Dev & Security
        • Cloud Security
        • HR Compliance
        • Identity & Access Management
        • Solution Development
        • Security Operations
        • Training and Awareness
        • Vulnerability and Threat Management
        • Security Operations & Technical Capabilities and Support
        • Data Management
        • Policies & Procedures
        • Tax Compliance
        • Privacy Compliance
        • Cloud Security Alliance
        • Others
        • Documents
          • Data Security
          • Information Security
          • Admin/Business
          • Others
          • Finance Compliance
    • πŸ§‘β€πŸ€β€πŸ§‘For End-Users
    • πŸ”—Pre-Built Integrations
    • πŸ›£οΈProduct Roadmap
  • πŸ‘¨β€πŸ’»Developer Resources
  • πŸ“…Release Notes
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. πŸ““User Resourceschevron-right
  2. πŸ‘¨β€πŸ’ΌFor Adminschevron-right
  3. πŸ”Security and Compliancechevron-right
  4. Documents

Data Security

hashtag
1.Data Protection Policyarrow-up-right

hashtag
2.Data Security Policy arrow-up-right

hashtag
3.Personal Identifiable Information (PII) Policyarrow-up-right

hashtag
4. Anonymization and Pseudonymization Policy arrow-up-right

hashtag
5.Data Retention and Disposal Policyarrow-up-right

hashtag
6.Data Subject Access Right Procedurearrow-up-right

hashtag
7.Data Breach Notification Procedurearrow-up-right

hashtag
8.Data Breach Notification Templatearrow-up-right

PreviousDocumentschevron-leftNextInformation Securitychevron-right

Last updated 4 years ago

Was this helpful?

  • 1.Data Protection Policy
  • 2.Data Security Policy
  • 3.Personal Identifiable Information (PII) Policy
  • 4. Anonymization and Pseudonymization Policy
  • 5.Data Retention and Disposal Policy
  • 6.Data Subject Access Right Procedure
  • 7.Data Breach Notification Procedure
  • 8.Data Breach Notification Template

Was this helpful?