DATA SECURITY POLICY

Last Updated: March 14, 2026

1. Our Commitment to Security

At INFINITECH, security is not just our business—it's our culture. As a provider of surveillance systems, access control, and critical infrastructure for healthcare, government, retail, and industrial clients, we understand that protecting sensitive data is paramount.

This Data Security Policy outlines the comprehensive measures we take to protect client information, system data, and business operations from unauthorized access, disclosure, alteration, and destruction.

2. Scope and Application

This policy applies to:

  • All INFINITECH employees, contractors, and subcontractors
  • All systems, networks, and equipment under INFINITECH control
  • Client information collected during business operations
  • Technical data related to installed security systems
  • Business operations and internal communications

3. Information Security Framework

Confidentiality

Ensuring information is accessible only to authorized individuals

Integrity

Maintaining accuracy and completeness of data

Availability

Ensuring authorized access when needed

4. Data Classification

We classify data into the following categories to apply appropriate protection measures:

Critical (Red)

Highest sensitivity requiring maximum protection:

  • Client security system configurations and credentials
  • Surveillance footage or access logs (if applicable)
  • Financial information and payment data
  • Personally identifiable information (PII)
  • Protected health information (PHI)

Confidential (Yellow)

Sensitive information requiring strong protection:

  • Business proposals and pricing
  • Client contact information
  • Vendor and partner agreements
  • Internal business processes
  • Employee information

Internal (Green)

Internal use information:

  • General project documentation
  • Internal communications
  • Policies and procedures
  • Training materials

Public (Blue)

Information approved for public disclosure:

  • Marketing materials
  • Website content
  • Press releases
  • Public case studies

5. Technical Security Controls

Network Security

  • Firewalls: Enterprise-grade firewalls protecting all network perimeters
  • VPN Access: Encrypted VPN required for all remote access
  • Network Segmentation: Separate VLANs for different security zones
  • Intrusion Detection: 24/7 monitoring for unauthorized access attempts
  • WiFi Security: WPA3 encryption for all wireless networks

Endpoint Security

  • Antivirus/Anti-Malware: Enterprise protection on all devices
  • Endpoint Detection: Advanced threat detection and response
  • Device Encryption: Full-disk encryption on all company devices
  • Mobile Device Management: Centralized control of mobile devices
  • Patch Management: Automated security updates and patches

Data Encryption

  • Data at Rest: AES-256 encryption for stored data
  • Data in Transit: TLS 1.3 for all data transmissions
  • Email Security: Encrypted email for sensitive communications
  • Database Encryption: Encrypted databases for client information

Access Controls

  • Multi-Factor Authentication: Required for all systems and applications
  • Role-Based Access: Minimum necessary access based on job function
  • Password Requirements: Complex passwords, regular rotation
  • Session Management: Automatic logout after inactivity
  • Privileged Access: Enhanced controls for administrative access

6. Physical Security

Office and Facility Security

  • Controlled access with electronic access control systems
  • Video surveillance of all entry points
  • Visitor management and escort requirements
  • Secure areas for sensitive equipment and documents
  • After-hours alarm systems

Equipment and Media

  • Locked storage for equipment containing client data
  • Secure disposal of hard drives and storage media
  • Asset tracking for all company equipment
  • Clean desk policy for sensitive information
  • Secure destruction of physical documents

7. Administrative Controls

Personnel Security

  • Background Checks: Criminal and employment verification for all employees
  • Confidentiality Agreements: Signed NDAs for all personnel
  • Security Training: Annual security awareness training
  • Termination Procedures: Immediate access revocation upon separation

Vendor Management

  • Security assessments of all third-party vendors
  • Data processing agreements with security requirements
  • Regular vendor security audits
  • Contractual security obligations

Policies and Procedures

  • Documented security policies and procedures
  • Regular policy reviews and updates
  • Acceptable use policies for technology resources
  • Incident response procedures
  • Business continuity and disaster recovery plans

8. Monitoring and Logging

We maintain comprehensive logging and monitoring:

  • System Access Logs: All system and application access logged
  • Security Event Monitoring: Real-time alerting for suspicious activity
  • Log Retention: Minimum 12-month retention for audit trails
  • Regular Review: Quarterly review of security logs
  • Anomaly Detection: Automated detection of unusual patterns

9. Incident Response

Security Incident Response Process

  1. Detection: Identify and verify security incident
  2. Containment: Isolate affected systems to prevent spread
  3. Notification: Alert management and affected parties within 24 hours
  4. Investigation: Determine scope, cause, and impact
  5. Remediation: Address vulnerabilities and restore operations
  6. Documentation: Record incident details and lessons learned
  7. Post-Incident Review: Improve processes to prevent recurrence

Reportable Incidents

We immediately report to affected clients any incidents involving:

  • Unauthorized access to client systems or data
  • Data breaches or exposure of sensitive information
  • Malware or ransomware affecting client systems
  • Physical security breaches at client sites
  • Loss or theft of devices containing client data

10. Data Retention and Disposal

Retention Periods

  • Client project files: 7 years after project completion
  • Financial records: 7 years from transaction date
  • System configurations: Duration of service plus 3 years
  • Access logs: 12 months minimum
  • Employee records: 7 years after separation

Secure Disposal

  • Electronic Data: DoD 5220.22-M wiping or physical destruction
  • Hard Drives: Degaussing and physical destruction
  • Paper Documents: Cross-cut shredding
  • Disposal Certification: Certificate of destruction provided

11. Client System Security

For security systems we install and maintain, INFINITECH implements:

  • Secure Configurations: Industry best-practice security settings
  • Default Credential Changes: All default passwords changed during installation
  • Network Isolation: Dedicated VLANs for security systems
  • Firmware Updates: Regular security patches and updates
  • Access Documentation: Detailed records of all system access
  • Remote Access Security: Encrypted VPN required for remote support

12. Compliance and Auditing

Regular Assessments

  • Annual security risk assessments
  • Quarterly vulnerability scans
  • Penetration testing as needed
  • Internal security audits
  • Third-party security reviews for high-risk projects

Compliance Standards

Our security practices align with:

  • NIST Cybersecurity Framework
  • ISO 27001 principles
  • HIPAA Security Rule (for healthcare clients)
  • PCI-DSS requirements (for payment processing)
  • State and federal data protection laws

13. Continuous Improvement

INFINITECH is committed to maintaining the highest security standards through:

  • Regular review and updates to security policies
  • Monitoring of emerging threats and vulnerabilities
  • Investment in security technology and tools
  • Ongoing employee training and awareness
  • Participation in industry security groups
  • Learning from security incidents and near-misses

14. Contact Information

For questions about our data security practices or to report a security concern:

INFINITECH - Security Officer

5820 IH 10 W.

San Antonio, TX 78201

Phone: (512) 914-9071

Email: security@infinitech-us.com

For urgent security incidents, call our 24/7 emergency line: (512) 914-9071

Skip to main content
CONTACT US
Customer Support Representative

GET IN TOUCH

LET'S DISCUSS YOUR SECURITY AND INFRASTRUCTURE NEEDS

Address

5820 IH 10 W.
San Antonio, TX 78201

BUSINESS HOURS

Monday - Friday:8:00 AM - 5:00 PM
Saturday:Closed
Sunday:Closed