RogerHR recognises that the confidentiality, integrity and availability of information and data created, maintained and hosted by us are vital to the success of the business and privacy of our partners.
As a service provider/product, we understand the importance in providing clear information about our security practices, tools, resources and responsibilities within RogerHR so that our customers can feel confident in choosing us as a trusted provider.
This Security Posture highlights high-level details about our steps to identify and mitigate risks, implement best practices, and continuously develop ways to improve.
Here are the important security policies and documents which are a part of RogerHR’s compliance program.
Communications & Network Security Policy
Policy
Data Breach Notification Policy
Policy
Asset Management Policy
Policy
Access Control Policy
Policy
Incident Management Policy
Policy
HR Security Policy
Policy
Data Protection Policy
Policy
Compliance Policy
Policy
Business Continuity & Disaster Recovery Policy
Policy
Vendor Management Policy
Policy
Acceptable Usage Policy
Policy
Code of Business Conduct Policy
Policy
Risk Assessment & Management Policy
Policy
Information Security Policy
Policy
Physical & Environmental Security Policy
Policy
ISMS Manual
Policy
ISMS Scope Document
Policy
Climate Considerations and Environmental Practices
Policy
AI Usage Policy
Policy
Software Development Lifecycle Policy
Policy
Data Governance Policy
Policy
Operation Security Policy
Policy
Legal Monitoring Policy
Policy
ISMS Manual
Document
ISMS Information Security Roles & Responsibilities
Document
Internal ISMS Scope Document
Document
ISO 27001-2022 Annex - Statement of Applicability
Document
ISO 27001-2022 Annex A Control Mapping
Document
Records of Processing Activities / Registre des activités de traitement.
Document