Over 2+ Million users across the globe trust us with their data being processed by our products. We back ourselves up with robust data security and privacy practices that form an integral part of our product engineering and service delivery principles.
We back ourselves up with robust data security and privacy practices that form an integral part of our product engineering and service delivery. We abide by the security & privacy by design principles. These principles have a robust framework for building and maintaining secure systems, applications, and services that address security and cybersecurity considerations by default and by design. We have a top-down governance and security in our DNA that lets us constantly wade through our threat vectors and calibrate to strengthen our security posture. These help us align with the changing business and technology landscape.
99minds has implemented and maintains appropriate technical and organizational measures designed to protect customer’s personal information as required by Data Protection Law(s).
For further details please refer to our information security policy.
99minds Inc (herein referred to as ‘99minds’ in this document) is committed to ensuring Confidentiality, Integrity, Availability, and Privacy and providing comprehensive protection to its information assets against the consequences of confidentiality breaches, failures of integrity interruptions to their availability.,
99minds is a SaaS-based continuous quality testing cloud platform that is used by over 2 Million developers and testers globally. With over 3000+ combinations of real browsers, mobile devices, and operating systems, it helps developers and testers to perform cross-browser and cross-platform compatibility testing at scale with blazing fast speed. Also, it helps them run tests on containers at scale and supports on-prem or private cloud deployment model. We believe in providing products that are ready to Go-To-Market, easy to set up and use, and require minimal customization. All of our products live up to this promise and are backed by our world-class support.
Our Customers include Fortune 500 & G2000 companies from across the globe and they trust us with their data security. We back ourselves up with robust data security and privacy practices that form an integral part of our product engineering, technology landscaping, and service delivery principles.
In support of the Security & Privacy by Design, security is at the heart of how we build our products, secure your data and provide high resilience. We have created and implemented security & privacy principles. These principles have a robust framework for building and maintaining secure systems, applications, and services that address and allow us to integrate a set of standards, guidelines, and best practices for managing information security, cybersecurity, data security, and privacy consideration or related risk by default and by design while ensuring its adherence to multiple requirements globally.
We have atop-down governance and security in our DNA and this helps us to constantly wade through our threat vectors and calibrate and strengthen our security posture to align with the changing business and technology landscape.
This policy applies to all 99minds employees, assignees, partners and contractors that provide services to 99minds and is an integral part of the Business Code of Conduct.
This also covers the security of information systems and data networks owned or used by 99minds as well as the information that is stored, transmitted, or processed by those systems.
99minds is committed to complying with all applicable legislation and law of the land in all locations and countries related to its operations and information processing.
Key legislation that is complied with include laws related to corporate governance, employee relations, data privacy, intellectual property, and financial reporting.
Executive leadership (Top Management) members are a part of the internal Information Security & Compliance Steering Committee (ISCSC), which ensures that all 99minds commitments to Customers and stakeholders are upheld.
99minds is committed to information security, protection of personal information, and privacy with applicable laws, regulations, and standards. Information Security & Compliance Steering Committee (ISCSC) members are responsible for defining and improving the Integrated Management System (IMS). The top management has demonstrated leadership and commitment to the Integrated Management System (IMS) by:
i. Ensuring the information security and personal data protection policy and its objectives are established and are compatible with the strategic direction of 99minds.
ii. Ensuring the integration of ISMS, PIMS, SOC 2, CSA, and other standards requirements into 99minds’s processes.
iii. Ensuring that the resources needed are available.
iv. Communicating the importance of an effective integrated management system and of conforming to integrated management system requirements
v. Ensuring that the IMS achieves its intended outcome(s)
vi. Directing and supporting persons to contribute to the effectiveness of IMS
vii. Promoting continual improvement
viii. Supporting other relevant management roles to demonstrate their leadership as it applies to their areas of responsibility
99minds is committed to:
i. Ensure Confidentiality, Integrity, Privacy, and Availability by adequately protecting the information and information systems against unauthorized access, modification, or alteration.
ii. Establish and implement security policies and processes while considering the protection of information and information systems from internal and external threats.
iii. Comply with legal, regulatory, and contractual security & privacy obligations as may be applicable.
iv. Ensure security and privacy awareness and competency amongst associates to enable them to meet their security & privacy obligations.
v. Provide a framework to manage and handle security incidents, privacy breaches, violations, and business disruptions.
vi. Ensure continuous improvement of the security & privacy posture to consistently meet its objectives.
99minds shall adopt leading industry security & privacy standards and practices to design and develop robust information security & privacy management framework to support this policy statement. To this effect, the policy shall be supported by domain-level security & privacy policies, procedures, guidelines, and standards, which shall be communicated and made available to relevant stakeholders.
At 99minds, the executive leadership (Top Management) members are a part of the internal Information Security & Compliance Steering Committee (ISCSC), which ensures that all 99minds commitments to Customers and stakeholders are upheld. The ISSC considers ensuring the security & privacy of Customer information and applying the right processing methods of any personal information in line with privacy regulations should be a way of working at 99minds.
While information security and privacy are an organization-wide responsibility, the ISCSC has established a dedicated information security and privacy team as independent custodians of the vision. Both teams directly report to ISCSC and independently manage the governance aspects of information security and privacy. The Information Security team is headed by the Information Security Officer (ISO) and the Privacy team is headed by Data Protection Officer (DPO) both directly report to the ISCSC. This committee is headed by the Chief Executive Officer (CEO).
The ISCSC is committed to constantly aligning its information security & privacy posture to ensure data security and assure non-repudiation for Customers' data, ensure secure and stable products that provide consistent output, ensure delivery of products and services that are highly resilient to internal and external threats and interruptions, ensure that its people are oriented to the principles of security & privacy by design as it applies to them in their respective job roles, and business processes are designed and implemented based on risk and control considerations.
On a half-yearly basis, the ISCSC reviews Information Security and Privacy in a structured manner. Following are the broad objectives of such reviews:
i. Road map: Ensure that the information security and privacy road map is well thought through after factoring in all Customer, regulatory and contractual requirements and is in sync with the internal and external threat vectors.
ii. Initiatives: Take stock of the various information security and privacy initiatives or programs and provide recommendations.
iii. Expertise: Ensure that adequate expertise is available for all information security and privacy initiatives. The ISCSC provides necessary technical inputs and ensures that 99minds leverages adequate expert opinions from various industry sources.
iv. Resources: Ensure that adequate people and financial resources are made available to various initiatives for effective execution.
v. Performance Evaluation: Ensure information security performance and the effectiveness of the information security management system and integrated management system.
In order to ensure proper internal controls and mitigate the risk of fraud and errors, 99minds is committed to maintaining a segregation of duties. The duties and responsibilities are divided among different individuals or teams to prevent any single person from having complete control over critical processes or systems.
99minds has a dedicated Information Security Officer, and Data Protection Officer, an independent team that runs information security and privacy functions. 99minds Information Security Office has the following teams:
99minds Data Protection & Risk Office has the following teams:
Also, GRC is responsible for ensuring that the company operates within the established legal, and regulatory frameworks. They are responsible for creating and implementing policies, procedures, and controls related to information security and privacy that are essential for the organization's compliance with laws and regulations, as well as mitigating risks associated with business operations. The policies and standards are reviewed by relevant stakeholders and approved by document owners at least annually. The policies and standards are made available to all 99minds employees on a centralized document repository.
At 99minds, we pride ourselves on building a powerful Cloud Testing Platform application that’s secure, reliable, easy to use and high-performance. We believe that customers and employees are the foundation of a successful business.
We are constantly on the lookout for smart people who are passionate about building great products, designing great experiences, building scalable platforms, and making customers happy.
All intents for the recruitments are raised to the HR department along with a description of the job, roles & responsibilities. The intents are approved by the respective department or pod heads based on their function’s specific recruitment plan. The HR and respective POD managers are responsible for conducting interviews. Depending upon the seniority of the role, the HR team sets up interviews with appropriate stakeholders. Candidates are selected based on validation of both culture and skill set fitment.
All employees joining 99minds undergo a mandatory background verification check that is initiated once their employment offer is rolled out. 99minds engages empaneled third-party service providers to perform background verifications covering identity, whereabouts, education history, employment history, and criminal history. Risks, if any, identified from background verification checks are analyzed and are approved or rejected by the respective function HR in association with the respective business manager.
All new joiners are batched and they join on Mondays. They undergo a 2-3 days onboarding schedule. During the onboarding process, employees are provided with an overview of the values lived at 99minds, the vision and key objectives, the organization structure and key stakeholders, and various processes that all employees are required to follow. As a part of the employee on-boarding process, all new joinees are provided with awareness training on information security, data privacy requirements, adherence to Code of Conduct and applicable compliances, and practices followed at 99minds. This includes appraising and training the employee on their responsibilities with regard to information security, privacy and compliance requirements.
All new joinees sign a confidentiality agreement as part of their employment agreement while being on-boarded as an employee. The agreement specifies their obligations and responsibilities as an employee while handling confidential information that the employee has access to during the course of their employment.
The Code of Business Conduct and Ethics (this Code) flows directly from the commitment of 99minds Inc., a Delaware corporation (together with its subsidiaries, “99minds”, “we”, “our”), to our mission and core values. We consistently aim for excellence and to provide value for our customers, partners, and stockholders, and it is critical that we do so with integrity and high ethical standards. It is unacceptable to cut legal or ethical corners for the benefits of 99minds or for personal benefits. The purpose of this Code is to promote ethical conduct, serve as a guide, and to deter both wrongdoing and the appearance of wrongdoing. Doing the right things is more important than winning while risking our reputation or the trust of our customers, partners, and stakeholders.
The Code is designed to ensure:
The Code of Conduct (“Code”) applies to all employees, officers, directors and independent contractors of 99minds Inc., and all its subsidiaries. Every employee will be required to confirm their acceptance and understanding of this Code in our annual review cycle. All employees are required to abide by this Code, which comprises the following policies:
As part of the onboarding process, employees are appraised about the internal policies and process as it applies to them. Employees are also informed about the complaint reporting mechanism and the disciplinary process that may ensure. Any violation of the policies is reported as an incident and isinvestigated by the HR team. Any violation, if proved results in a warning, payment of compensation, withdrawal of promotion, suspension, or termination of employment, based on the nature of the violation.
When associates are transferred internally, the HR Manager finalizes the last day of service along with the reporting manager which is then communicated to the new respective manager as well. Accordingly, a request is raised for aligning the access needs in line with the new job role.
All resignation notices will be submitted to the reporting manager and HR. The reporting manager shall, with the consent of HR, recommend and confirm the date of relieving. The exit process will be initiated and the exit form needs to be signed off by the respective associate’s reporting manager, Cloud Infrastructure team, Administration, IT, and HR team will ensure that the accesses to all information and assets granted to the employee are returned and revoked.
Employees while working remotely must adhere to 99minds’s policies and procedures to protect confidential information. This includes using secure networks, ensuring passwords are strong and regularly updated, and following best practices for data protection.
99minds’s employees are security and privacy-minded through its continuous educational activities and practical exercises about evolving threats, compliance obligations, and secure workplace practices.
99minds has established a formal Asset Management Policy; and the process is necessary to facilitate effective management, control, and maintenance of the assets/information in its operations environment by classifying assets as per the functionality or criticality.
We are committed to sustainable asset management practices that promote environmental responsibility and efficiency. The objective of our asset management program is to effectively monitor, track, and optimize the utilization of all company assets to ensure maximum efficiency, cost-effectiveness, and return on investment. Through strategic planning, proactive maintenance, and accurate data analysis, 99minds minimizes downtime, extends asset lifespan, and reducesreduce operational expenses. By implementing best practices and leveraging technology, we aim to maximize productivity, improve asset performance, and ultimately enhance overall business performance and profitability. 99minds has defined process phases for Asset Management such as Planning, acquisition, operation, maintenance, disposal and performance monitoring.
This policy is to identify, classify, label, and handle Information Assets of 99minds, and to apply protection mechanisms commensurate with the level of confidentiality and sensitivity.
Employees are educated on being responsible and exercising good judgment regarding the reasonableness of personal use. For security and network maintenance purposes, authorized individuals within 99minds, monitor equipments, systems, and network traffic. We reserve the right to suspend or disable employee network accounts for an actual or suspected security breach or policy violation. Any IT resource assigned to an employee is not transferred to another employee or group without first following a procedure of intimating IT so that the transfer is recorded. The transfer should be made post a sign-off from IT. In the event of loss of an asset post an un-intimated transfer for any purpose, the employees are held liable and appropriate fines are levied.
99minds information may include, but is not limited to:
99minds maintains an inventory of all virtual devices (including servers and networking components), and physical devices. All the devices are labeled and tracked in an asset register with information about the asset owner, asset custodian, and asset location. The asset register is kept current and is updated whenever the assets are moved or retired or serviced.
99minds has developed and implemented a formal procedure for the information classification and handling standard consisting of distinct levels which must be followed by all 99minds employees. The protection level and requirements for data processing are defined for each classification category. 99minds classification model into four levels of categories:
The classification levels of all information or data is identified, both on the data and in the asset inventory. Accessibility will enable 99minds to focus information or data protection mechanisms on those assets that are most susceptible to specific risks. Information Assets may be assigned security based on their susceptibility to risk.
Restricted information is the most sensitive form of information. It is so sensitive that disclosure or usage would have a definite impact on 99minds’s business.
Extremely restrictive controls need to be applied (e.g., very limited audience and those who are authorized to have such a form of information).
Extremely restrictive controls need to be applied (e.g., very limited audience and those who are authorized to have such a form of information).
Confidential information is distributed on a “Need to Know” basis only. It is so confidential that disclosure or usage would have a definite impact on 99minds’s business.
Examples include System Security Parameters and Risk Assessment or Audit records, Intellectual Property, Customer Data, business plans, unpublished financial statements, Firewall and Router Configurations, Service Contracts, etc.
This class of information is either generated by 99minds or is owned by 99minds. This information should not be shared externally or with third parties. There can be exceptions in certain cases, where information has access rights to certain specific people. This form of information must be used within 99minds and not shared externally or with third parties.
Examples include staff memos, company newsletters, staff awareness program documentation or bulletins, email, Backup media, SOP, etc.
This class of information does not have any impact on the confidentiality of the Information Asset. This caters to the form of information that has either come from a public source or is provided by the company/company’s client to the general public.
Examples include periodicals, advertisements, public bulletins, published company financial statements, published press releases, etc.
99minds has adopted Zero Trust model for Identity and Access Management (IAM) to ensure the concept of “never trust, always verify”, and access rights would be provisioned on the basis of "least privilege”, “need-to-know”, and “need-to-have or need-to-do-principles”. As a part of the user lifecycle management, defined processes for adding, changing, and removing users and their access rights are applied across all information systems, applications, services and regular periodic reviews of those access rights are conducted.
IAM is paramount to protecting 99minds information resources and requires the implementation of controls and continuous oversight to restrict access.
By default, 99minds adopted the least access privileges and role-based access principle provision in its all information system. Few employees of 99minds from Customer Success and Solution engineering have access to Customer accounts as they need this access for any configuration or troubleshooting. These privilegeaccesses are reviewed on a regular basis.
99minds provides a role-based administration for all user accounts. There are 3 roles: admin, user, and guest, each with different permissions. The administrators of the account can control the user’s permission and activity.
99minds partners with organizations like itself to adhere to global standards and regulations. These organizations include sub-processors or third-parties that 99minds utilizes to assist in providing its products and services.
This means, like 99minds, by default no sub-processors have access to any Test execution data of Customer. Incidents and support tickets are handled by 99minds.
Further, on a case-to-case basis, if an incident/support requirement arises that only the sub-processors can handle, access is provided by the Customer’s admin through the product as a temporary user and immediately revoked once the issue has been resolved.
Access to 99minds internal systems are based on the principles of least privilege for access. Accordingly, all information systems and data are classified and further segregated to support role-based access requirements. Furthermore, while defining job roles and designing access roles, privileges leading to conflicts of interests are to be avoided. Strong identification, authentication, and logging systems are deployed and provide a centralized control to administer, monitor and review all critical access events.
At 99minds, different environments are established from a product standpoint. The product has different environments for development, testing and production purposes. Each of these environments is shielded and controlled from interactions with the other environments. Developers do not have access to the production environment (including no access to migrate changes). Access to migration changes is limited to only designated and authorized individuals.
All access requests are logged, tracked, and managed through Jira (Atlassian suite). All-access requests are approved by the reporting manager and product owner. Also, the requests are approved by the respective department head or their delegated set of approval. Once approved, the request is routed to the respective system administrators for provisioning the access. Logs of all access requests raised, approval obtained and provisioning made in the systems are maintained to establish an end-to-end audit trail.
Access to all environments (development, test, and production) and resources within it are centrally managed using IAM system. The user IDs follow our internal guidelines for naming convention and are managed such that it is identifiable to a user. We have implemented strong password parameters that apply to all the systems. All accesses are permitted only from registered user systems and only from the whitelisted IP addresses of 99minds. All the access is routed through the bastion host, where the IAM solution enforces role-based access and two-factor authentication. System access logs for access to Customer data are maintained and subject to review by NOC and SOC team that operates on a 24x7 basis.
Accordingly, access to the 99minds production environment is limited to authorized users from the development or testing teams. All access to the 99minds production environment is allowed only from within the 99minds corporate network that’s behind VPN. For handling business continuity, disaster recovery, and pandemic scenarios, administrative and management users (Cloud Infrastructure, Database administrators, On-call Support, 24x7 Monitoring teams) have been provided with VPN access to connect to the office network. All the access is protected via Single Sign On (SSO) or Two-factor authentication and all accesses will be logged.
On a quarterly basis, the ownership of all user accounts in the production environment is reviewed by the product owner. For sensitive and critical accounts, the review is performed on a monthly basis. The information security team tracks the process of user access reviews and reports the findings to the ISCSC.
The complexity and length of passwords are set according to best practices and adapted if necessary. With processes designed to enforce minimum password requirements for 99minds products, we utilize the following requirements and security standards for user passwords on the 99minds Service:
99minds lets you implement Single Sign-On (SSO) through SAML 2.0, an open standard data format for exchanging authentication and authorization information. This allows your team to log in to the 99minds platform using their existing corporate credentials. SSO is available on select packages only, so please consult your order form for eligibility.
99minds has developed and implemented a formal process for the cryptographic protection standard and ensures the confidentiality, authenticity, and integrity of the information that is transferred through a third-party network and protects against unauthorized access or malicious activities.
i. Cryptographic controls can be used to achieve different security objectives, e.g:
a. Confidentiality:Using encryption of information to protect restricted or critical information, either stored or transmitted.
b. Integrity/Authenticity:Using encryption of information to protect restricted or critical information, either stored or transmitted.
c. Non-Repudiation:Using cryptographic techniques to obtain proof of the occurrence or nonoccurrence of an event or action.
ii. Cryptographic controls shall be used in compliance with all relevant agreements, laws, and regulations.
We use cryptographic methods and industry standards to protect customer data in transit and at rest. For example, all communications with 99minds platforms and APIs are encrypted via industry standard HTTPS/TLS (TLS 1.2 or higher) over public networks. This ensures that all traffic between you and 99minds is secure during transit. By default, encryption is also enabled on all our services that contain data at rest using AES-256 bit standards with keys being managed by key management services.
At 99minds, we prioritize the security and integrity of our cryptographic keys through stringent key management practices. Our approach follows industry standards and best practices, encompassing key generation, distribution, storage, updates, and disposal. We maintain strict controls over key access and usage, promptly addressing any compromises or incidents. Additionally, we ensure compliance with legal requirements and safeguard key authenticity alongside integrity. Our commitment extends to protecting keys against unauthorized access and physical threats.
The following section provides an overview of the physical and environmental security safeguards at 99minds Product Development center in India and the data center where 99minds products and data are hosted
99minds operates out of a multi-tenant building where perimeter security is centrally provided by the Building Management System team. The building is continuously patrolled by security guards on a 24x7 basis. The guards only allow employees with a valid ID card inside the building.
Access to the 99minds office is restricted only to 99minds’s employees and authorized support staff. CCTVs are installed across all vantage points within the office including all the entry and exit points. The administration and facilities team is responsible for monitoring the CCTV footage and these are retained for a minimum of 90 days.
24x7 dedicated security guards are deployed at entry and exit points. All the entry points are further secured using a proximity-based access card system. Access reviews are carried out by the 99minds Administration team on a regular basis to ensure only authorized 99minds employees or support staff have access.
All visitors are registered at the entrance at 99minds with details of host and purpose of visit. The visitors are provided an ID tag and are always escorted by a host while inside the premises.
99minds has procedures established for equipment’s seiting and identifications. At the entrance, the security personnel tracks the movement of equipment and consumables and verifies relevant authorizations for bringing in or removing any classified materials. The IT team ensures that all equipment movements are approved and sent to authorized recipients. Dedicated loading and unlocking areas have been identified for the movement and disposal of electronic media and equipment. Such movements are authorized by the IT Manager and tracked by the Facilities Administration team.
The office workspace has multiple controlled entry and exit points with visible markings and floor maps displayed that assist in speedy evacuation from anywhere in the office. Smoke detectors are installed throughout the facility and are supported by sprinkler-based fire suppression systems that run throughout the facility. Further, appropriate types of fire extinguishers are placed at various locations in the facility with clear markings. The facility is covered with a public address system that helps to provide any flash announcements in case of any emergency.
A centrally managed Heating, Ventilation, and Air-Conditioning system (HVAC) has been installed and managed by the facilities administration team. The power supply received for the facility is integrated with an Uninterrupted Power Supply (UPS) and Diesel-based power generator. In case of any power interruptions, automatic and uninterrupted switch-over will happen to ensure that there is no impact on the facility and its systems or equipment. All power cables and network cables are secured and shielded from interferences and are identified for supporting maintenance and troubleshooting work.
All the equipment and systems providing environment safeguards are covered under warranties and annual maintenance contracts and accordingly, these are covered under regular preventive maintenance checks to ensure its proper functionating.
99minds hosts its products and associated data in AWS and Microsoft Azure data centers that provide cutting-edge security and resilience and are compliant with a plethora of information security standards and frameworks. The data centers are hosted in nondescript facilities. Physical access is strictly controlled both at the perimeter and at building ingress points by professional security staff utilizing video surveillance, motion detectors, intrusion alarm systems, and other electronic means. Authorized staff must pass through two-factor authentication a minimum of two times to access data center floors.
Physical access to the hub room located at 99minds’s corporate office is restricted by professional security staff and video surveillance. Access can only be granted through the combination of access card and biometrics. Along with that, a physical logbook is also maintained where details like name of the person, purpose, in and out time are recorded.
99minds prioritizes the resilience and reliability of its utility infrastructure to support uninterrupted business operations. Our approach includes strict adherence to manufacturer specifications, regular appraisal, proactive inspection, and testing. We employ alarm systems for early detection, redundancy measures for continuity, and network segregation for security. Emergency provisions, including lighting, communications, and contact details, ensure swift response during outages or emergencies. This commitment underscores our dedication to safeguarding operations and personnel safety.
Cabling security is ensured by implementing measures such as underground installation where possible, segregation of power and communication cables, use of armoured conduit and locked rooms, electromagnetic shielding, regular inspections, controlled access to cable and hub rooms, and proper labeling of cables for physical identification.
All critical IT equipment is hosted in AWS and Microsoft Azure data centers. Automatic fire detection and suppression equipment have been installed to reduce risk. The fire detection system utilizes smoke detection sensors in all data center environments including the mechanical and electrical infrastructure spaces, chiller rooms, and generator equipment rooms. These areas are protected by either wet-pipe, double-interlocked pre-action, or gaseous sprinkler systems as suitable based on the types of combustible materials in the respective zones.
Submersible pumps are installed and maintained as a safeguard against a flood event. The data centers get power from two different feeder channels and are additionally supported by the power generators and UPS all having automated switch over in case of any rare instances of power outages. The data center’s electrical power systems are designed to be fully redundant and maintainable without impact on operations, 24 hours a day, seven days a week. UPS units provide backup-up power in the event of an electrical failure for critical and essential loads in the facility. Data centers use generators to provide backup power for the entire facility.
Climate controls are required to maintain a constant operating temperature for servers and other hardware, which prevents overheating and reduces the possibility of service outages. Data centers are conditioned to maintain atmospheric conditions at optimal levels. Personnel and systems monitor and control temperature and humidity at appropriate levels.
99minds prioritizes equipment maintenance to safeguard our information assets. We adhere to supplier recommendations, implement a robust maintenance program, and restrict access to authorized personnel. Records are kept for all maintenance activities, and security measures are enforced for on-site maintenance. We comply with insurance requirements and conduct thorough inspections before reactivating equipment. Our goal is to ensure equipment reliability, security, and confidentiality.
99minds prioritizes the secure disposal and re-use of equipment and storage media containing confidential information. All employees must adhere to thorough verification processes, physical destruction of storage media, removal of identifying labels, and consideration of security control removal when moving premises. These measures are essential for maintaining information security and compliance.
99minds maintains a formal information security management program with dedicated security personnel reporting to 99minds's Head of Security. 99minds has established a formal policy and process for the requirements and key information security considerations for information technology operations, including the definition of standard operating procedures, change management, configuration management, release management, information backup, and restoration and cloud computing.
There are a number of security controls in place to achieve the protection of data, information, information system, and monitoring 99minds for suspicious activity.
By adhering to these guidelines, we ensure the integrity and security of our operational systems.