IT Security Overview

All of the following are policies and programs adhered to by the Drafted, Inc. organization and its affiliates. For questions, please email [email protected]

Data Retention and Access Policy

This policy describes any and all data storage and access requirements for any employees in

the Drafted, Inc. organization as it relates to its customers and affiliates

Contractor Security Policy

This policy describes all permissions and data access of any independent contractors or

organizations that contract on behalf of the Drafted, Inc organization and its affiliates

Vulnerability Management Policy

This policy describes the definition and organization of vulnerabilities as it relates to the Drafted, Inc. organization and its affiliates

Security Violation Policy

This policy describes the levels and consequential actions of security violations that the Drafted, Inc. organization adheres to for its employees and contractors

Internal Systems Access Policy Summary

This policy describes the structure of data access and the requirements around provisioning and terminating data access of employees in the Drafted, Inc. organization

Security Incident Response Program

This program defines the structure of the response protocol for any security incidents that occur within or impact the Drafted, Inc. organization or its customers

Policy Exception Request Process

A document which describes the way in which a user with a defined role (see “Internal Systems Access Policy”) can request to do something outside of the standard operating procedure defined in the documents above.