Thanks to visit codestin.com
Credit goes to trust.delve.co

Tembo logoTembo

Tembo Trust Center

Tembo is in compliance with security best practices, has implemented and is monitoring comprehensive controls, and maintains policies to outline its security procedures.

Compliance

Resources

SOC 2 Type I Report
Consent Withdrawal Policy
Binding Corporate Rules (BCRs) Policy
Change Management Policy
Statement of Applicability

Controls

Remote access tool
ePHI policy accessibility evidence
Access restricted to modify infrastructure
Access control procedures
Access review of infrastructure
ePHI data sanitization
Encryption of data
Data disposal policy
Privacy and confidentiality governance charter
Data protection policy
Source code tool
Business continuity and disaster recovery testing
Vulnerability scanning
Web application firewall
Sample code changes
SSL/TLS certificates for infrastructure
Intrusion detection tool
Infrastructure baseline hardening policy
Network diagram
Monitoring, measurement, analysis and evaluation
Security incident list
Alerts and remediation
Incident response and breach notification policy
Breach notification communication
Internal GDPR compliance assessments
Binding corporate rules policy
Whistleblower policy
Rectification request policy
Objection handling policy
Log management tool
ePHI risk assessment report
Vendor management program
Vendor list
Vendor onboarding
Vendor termination
Consent records
Age verification and parental/guardian consent process
Media disposal training
New employee and contractor agreements
Security awareness training implemented
Background checks
List of newly hired employees & contractors
Asset register maintaining
Multi-availability zones
Risk management program
Risk and Governance Executive Committee meeting minutes
Lawful basis assessment
Legitimate interest assessment
Information security policies and procedures
Customers list
Mobile device management tool
Patient status and admission records
Mobile device management tool configurations