The code of conduct for public website users who browse and buy art:
Version: 1.0
Effective Date: 15 February 2025
Serving the Carolinas and Georgia
https://www.twistedartistsguild.com
**
**
Security Policies
-
Password Management
-
Members of the staff will never ask for your password because they cannot even reference it.
-
All passwords will be converted to a digital hash before they are sent over the internet and are only transmitted through encrypted channels.
-
-
Data Protection
-
All sensitive data must be encrypted at rest and in transit to prevent unauthorized access.
-
Regular audits will be conducted to ensure compliance with data protection regulations.
-
-
Network Security
-
Firewalls and intrusion detection systems will be implemented to monitor and block suspicious activities.
-
Regular updates and patches will be applied to all systems to protect against known vulnerabilities.
-
-
Access Control
-
Access to sensitive information will be restricted to authorized personnel only.
-
Multi-factor authentication will be required for accessing critical systems.
-
-
Employee Training
-
Regular cybersecurity training sessions will be conducted to educate employees about potential threats and safe practices.
-
Phishing simulations will be used to test and improve employee awareness.
-
-
Incident Response Plan
-
A detailed incident response plan will be developed and regularly updated to handle potential cyber-attacks effectively.
-
The plan will include procedures for identifying, containing, eradicating, and recovering from an attack.
-
-
Monitoring and Reporting
-
Continuous monitoring of systems and networks will be conducted to detect anomalies and potential threats.
-
A clear reporting mechanism will be established for employees to report suspected security incidents.
-
-
Third-Party Risk Management
-
Vendors and partners will be assessed for cybersecurity risks before engagement.
-
Contracts with third parties will include clauses for data protection and breach notification.
-
-
Backup and Recovery
-
Regular backups of critical data will be performed and stored securely offsite.
-
A disaster recovery plan will be in place to ensure business continuity in the event of a major cyber incident.
-
-
Legal and Regulatory Compliance
-
The organization will comply with all applicable cybersecurity laws and regulations.
-
Regular reviews will be conducted to ensure ongoing compliance.
-
By implementing these measures, the organization aims to protect itself from cyber-attacks and ensure a swift and effective response if one occurs.