All Collections
Privacy & Security
Policies and Processes
How does Coassemble ensure the security of staff and contractors?
How does Coassemble ensure the security of staff and contractors?

Coassemble takes security measures seriously, particularly those regarding our internal employees and contractors.

Dimity avatar
Written by Dimity
Updated over a week ago

Firstly, pre-employment screening is conducted prior to hiring new employees, background checks are using recruitment at Coassemble.

All Coassemble employees undergo an induction module outlining best practices for information security, including (but not limited to):

  • Workplace security

  • Physical security

  • Password management

  • Mobility

  • Acceptable use of IT

  • Reporting incidents

  • Handling sensitive information

Regarding access management systems, each employee has a username and password (for Google Office) which functions as an access management system for most business applications, infrastructure and services. We utilize 2 Factor Authentication on all Business platforms that hold company data and have clear signed policies and risk mitigation strategies in place Company directors control the access management system, ensuring that employees only have access only to appropriate level for systems required in day-to-day operations (for example, Mercurial).

All login attempts are recorded, including SSH access, to managed infrastructure to ensure we have a log of any actions performed by Coassemble employees.

Additionally, using our Coassemble access management system, employee permissions can be easily revoked at short-notice. This is also agreed upon with any remote staff and is indicated in Staff Policies signed by all staff.

Ensuring the security of external staff

All Coassemble contractors undergo an induction module outlining best practices for information security, including (but not limited to):

  • Workplace security

  • Physical security

  • Password management

  • Mobility

  • Acceptable use of IT

  • Reporting incidents

  • Handling sensitive information

Regarding access management systems, sub-contractors are not granted permissions via our access management system.

Did this answer your question?