DATA SECURITY POLICY
Last Updated: March 14, 2026
1. Our Commitment to Security
At INFINITECH, security is not just our business—it's our culture. As a provider of surveillance systems, access control, and critical infrastructure for healthcare, government, retail, and industrial clients, we understand that protecting sensitive data is paramount.
This Data Security Policy outlines the comprehensive measures we take to protect client information, system data, and business operations from unauthorized access, disclosure, alteration, and destruction.
2. Scope and Application
This policy applies to:
- All INFINITECH employees, contractors, and subcontractors
- All systems, networks, and equipment under INFINITECH control
- Client information collected during business operations
- Technical data related to installed security systems
- Business operations and internal communications
3. Information Security Framework
Confidentiality
Ensuring information is accessible only to authorized individuals
Integrity
Maintaining accuracy and completeness of data
Availability
Ensuring authorized access when needed
4. Data Classification
We classify data into the following categories to apply appropriate protection measures:
Critical (Red)
Highest sensitivity requiring maximum protection:
- Client security system configurations and credentials
- Surveillance footage or access logs (if applicable)
- Financial information and payment data
- Personally identifiable information (PII)
- Protected health information (PHI)
Confidential (Yellow)
Sensitive information requiring strong protection:
- Business proposals and pricing
- Client contact information
- Vendor and partner agreements
- Internal business processes
- Employee information
Internal (Green)
Internal use information:
- General project documentation
- Internal communications
- Policies and procedures
- Training materials
Public (Blue)
Information approved for public disclosure:
- Marketing materials
- Website content
- Press releases
- Public case studies
5. Technical Security Controls
Network Security
- Firewalls: Enterprise-grade firewalls protecting all network perimeters
- VPN Access: Encrypted VPN required for all remote access
- Network Segmentation: Separate VLANs for different security zones
- Intrusion Detection: 24/7 monitoring for unauthorized access attempts
- WiFi Security: WPA3 encryption for all wireless networks
Endpoint Security
- Antivirus/Anti-Malware: Enterprise protection on all devices
- Endpoint Detection: Advanced threat detection and response
- Device Encryption: Full-disk encryption on all company devices
- Mobile Device Management: Centralized control of mobile devices
- Patch Management: Automated security updates and patches
Data Encryption
- Data at Rest: AES-256 encryption for stored data
- Data in Transit: TLS 1.3 for all data transmissions
- Email Security: Encrypted email for sensitive communications
- Database Encryption: Encrypted databases for client information
Access Controls
- Multi-Factor Authentication: Required for all systems and applications
- Role-Based Access: Minimum necessary access based on job function
- Password Requirements: Complex passwords, regular rotation
- Session Management: Automatic logout after inactivity
- Privileged Access: Enhanced controls for administrative access
6. Physical Security
Office and Facility Security
- Controlled access with electronic access control systems
- Video surveillance of all entry points
- Visitor management and escort requirements
- Secure areas for sensitive equipment and documents
- After-hours alarm systems
Equipment and Media
- Locked storage for equipment containing client data
- Secure disposal of hard drives and storage media
- Asset tracking for all company equipment
- Clean desk policy for sensitive information
- Secure destruction of physical documents
7. Administrative Controls
Personnel Security
- Background Checks: Criminal and employment verification for all employees
- Confidentiality Agreements: Signed NDAs for all personnel
- Security Training: Annual security awareness training
- Termination Procedures: Immediate access revocation upon separation
Vendor Management
- Security assessments of all third-party vendors
- Data processing agreements with security requirements
- Regular vendor security audits
- Contractual security obligations
Policies and Procedures
- Documented security policies and procedures
- Regular policy reviews and updates
- Acceptable use policies for technology resources
- Incident response procedures
- Business continuity and disaster recovery plans
8. Monitoring and Logging
We maintain comprehensive logging and monitoring:
- System Access Logs: All system and application access logged
- Security Event Monitoring: Real-time alerting for suspicious activity
- Log Retention: Minimum 12-month retention for audit trails
- Regular Review: Quarterly review of security logs
- Anomaly Detection: Automated detection of unusual patterns
9. Incident Response
Security Incident Response Process
- Detection: Identify and verify security incident
- Containment: Isolate affected systems to prevent spread
- Notification: Alert management and affected parties within 24 hours
- Investigation: Determine scope, cause, and impact
- Remediation: Address vulnerabilities and restore operations
- Documentation: Record incident details and lessons learned
- Post-Incident Review: Improve processes to prevent recurrence
Reportable Incidents
We immediately report to affected clients any incidents involving:
- Unauthorized access to client systems or data
- Data breaches or exposure of sensitive information
- Malware or ransomware affecting client systems
- Physical security breaches at client sites
- Loss or theft of devices containing client data
10. Data Retention and Disposal
Retention Periods
- Client project files: 7 years after project completion
- Financial records: 7 years from transaction date
- System configurations: Duration of service plus 3 years
- Access logs: 12 months minimum
- Employee records: 7 years after separation
Secure Disposal
- Electronic Data: DoD 5220.22-M wiping or physical destruction
- Hard Drives: Degaussing and physical destruction
- Paper Documents: Cross-cut shredding
- Disposal Certification: Certificate of destruction provided
11. Client System Security
For security systems we install and maintain, INFINITECH implements:
- Secure Configurations: Industry best-practice security settings
- Default Credential Changes: All default passwords changed during installation
- Network Isolation: Dedicated VLANs for security systems
- Firmware Updates: Regular security patches and updates
- Access Documentation: Detailed records of all system access
- Remote Access Security: Encrypted VPN required for remote support
12. Compliance and Auditing
Regular Assessments
- Annual security risk assessments
- Quarterly vulnerability scans
- Penetration testing as needed
- Internal security audits
- Third-party security reviews for high-risk projects
Compliance Standards
Our security practices align with:
- NIST Cybersecurity Framework
- ISO 27001 principles
- HIPAA Security Rule (for healthcare clients)
- PCI-DSS requirements (for payment processing)
- State and federal data protection laws
13. Continuous Improvement
INFINITECH is committed to maintaining the highest security standards through:
- Regular review and updates to security policies
- Monitoring of emerging threats and vulnerabilities
- Investment in security technology and tools
- Ongoing employee training and awareness
- Participation in industry security groups
- Learning from security incidents and near-misses
14. Contact Information
For questions about our data security practices or to report a security concern:
INFINITECH - Security Officer
5820 IH 10 W.
San Antonio, TX 78201
Phone: (512) 914-9071
Email: security@infinitech-us.com
For urgent security incidents, call our 24/7 emergency line: (512) 914-9071
