Founded in 2023
Sandbox Financial Technologies Private Limited recognises that the confidentiality, integrity and availability of information and data created, maintained and hosted by us are vital to the success of the business and privacy of our partners.
As a service provider/product, we understand the importance in providing clear information about our security practices, tools, resources and responsibilities within Sandbox Financial Technologies Private Limited so that our customers can feel confident in choosing us as a trusted provider.
This Security Posture highlights high-level details about our steps to identify and mitigate risks, implement best practices, and continuously develop ways to improve.
Founded in 2023
Here are the important security policies and documents which are a part of Sandbox’s compliance program.
Acceptable Usage Policy
Policy
Access Control Policy
Policy
Business Continuity Policy
Policy
Data Classification Policy
Policy
Data Retention Policy
Policy
Physical Security Policy
Policy
Endpoint Security Policy
Policy
Incident Management Policy
Policy
Media Disposal Policy
Policy
HR Security Policy
Policy
Vendor Management Policy
Policy
Encryption Policy
Policy
Risk Management Policy
Policy
Information Security Policy
Policy
Code of Business Conduct Policy
Policy
Access Control Procedure
Policy
Asset Management Policy
Policy
Business Continuity Plan
Policy
Compliance Procedure
Policy
Asset Management Procedure
Policy
Compliance Policy
Policy
HR Security Procedure
Policy
Network Security Policy
Policy
Operation Security Policy
Policy
Incident Management Procedure
Policy
Network Security Procedure
Policy
Physical and Environmental Security Procedure
Policy
Operations Security Procedure
Policy
Organization of Information Security Policy
Policy
Vendor Management Procedure
Policy
SDLC Procedure
Policy
System Acquisition and Development Lifecycle Policy
Policy
Data Protection Policy
Policy
Data Breach Notification Policy
Policy
Privacy By Design Policy
Policy
ISMS manual document
Policy
ISMS scope document
Policy
System Description
Policy
ISMS Information Security Roles & Responsibilities
Policy
Vulnerability Management Procedure
Policy