1. Context

Convergent cyber security policy outlines our guidelines and provisions for preserving the security of our data and technology infrastructure.

The more we rely on technology to collect, store, and manage information, the more vulnerable we become to severe security breaches. Human errors, hacker attacks and system malfunctions could cause great damage both in terms of breach of confidentiality and financial loss to the company. For this reason, we have implemented several security measures. We have also prepared instructions that may help mitigate security risks. We have outlined both provisions in this policy.

If you have any questions, please get in touch with Meghana Akella, Senior Manager - meghana@convergentview.com.

2. Scope

This policy applies to all Convergent employees, contractors, volunteers and anyone who has permanent or temporary access to our systems and hardware.

3. Policy elements

3.1. Confidential data

Confidential data is secret and valuable. Common examples are

All Convergent employees are obliged to protect this data. In this policy, we will give all Convergent employees instructions on how to avoid security breaches.

3.2. Protect personal and company devices

When Convergent employees use their digital devices to access company emails or accounts, they introduce security risk to our data. We advise our employees to keep both their personal and company-issued computer, tablet and cell phone secure. They can do this if they:

We also advise all Convergent employees to avoid accessing internal systems and accounts from other people’s devices or lending their own devices to others

3.3. Keep emails safe

Emails often host scams and malicious software (e.g. worms.) To avoid virus infection or data theft, we instruct employees to:

If an employee isn’t sure that an email they received is safe, they can refer to our designated IT professional.

3.4. Manage passwords properly

Password leaks are dangerous since they can compromise our entire infrastructure. Not only should passwords be secure so they won’t be easily hacked, but they should also remain secret. For this reason, we advise all Convergent employees to:

3.5. Transfer data securely

Transferring data introduces security risk. Convergent employees must:

Our security specialists need to know about scams, breaches, and malware so they can better protect the Convergent infrastructure. For this reason, we advise all Convergent employees to report perceived attacks, suspicious emails, or phishing attempts as soon as possible to our specialists. Our security specialists must investigate promptly, resolve the issue and send a company-wide alert when necessary

Our Security Specialists are responsible for advising employees on how to detect scam emails. We encourage our employees to reach out to them with any questions or concerns

3.6. Additional measures

To reduce the likelihood of security breaches, we also instruct all Convergent employees to:

Convergent security specialists should:

Convergent will have all physical and digital shields to protect information.

3.7. Remote employees

Remote employees must follow this policy’s instructions too. Since they will be accessing our company’s accounts and systems from a distance, they are obliged to follow all data encryption, protection standards and settings, and ensure their private network is secure.

We encourage them to seek advice from our designated security specialists/ IT administrators

3.8. Disciplinary Action

We expect all Convergent employees to always follow this policy and those who cause security breaches may face disciplinary action:

Additionally, employees who are observed to disregard our security instructions will face progressive discipline, even if their behavior hasn’t resulted in a security breach.

3.9. Take security seriously

Everyone, from our clients and partners to our employees and contractors, should feel that their data is safe. The only way to gain their trust is to proactively protect Convergent’s systems and databases. We can all contribute to this by being vigilant and keeping cyber security top of mind.

Disclaimer: This policy template is meant to provide general guidelines and should be used as a reference. It may not take into account all relevant local, state or federal laws and is not a legal document. Neither the author nor Convergent will assume any legal liability that may arise from the use of this policy