New app:
Spell check entire websites
Osborn Design Works (ODW) recognizes the paramount importance of safeguarding user information and we are committed to maintaining the highest standards of user data protection.
This Information Security Policy outlines our objectives and high level technical measures that ensure compliance with common regulations: CPRA, CCPA, HIPAA, and GDPR.
Updated: May 7, 2024
1. Introduction
2. Information Security Objectives
3. Risk management strategy
4. Technical Security Controls
6. Continuous Improvement
Osborn Design Works (ODW) prioritizes protecting the data of our app users, clients, and their users. Our Information Security Policy establishes a framework to ensure that the websites, applications, and software we build—and the data stored on servers we manage—adhere to local regulations in addition more stringent discretionary or strategic business requirements.
We have developed products compliant with the CCPA & CPRA regimes, HIPAA, and GDPR. Our proprietary software, utilized by over 50,000 designers globally, is consistently updated to align with evolving data security standards. This Information Security Policy applies to all employees, contractors, and clients, ensuring compliance requirements are tailored according to relevant local laws.
Each project's risk management strategy must be tailored to its unique requirements and the technologies involved. Our approach ensures that the chosen measures address the specific threats and vulnerabilities inherent in the project's architecture and tech stack. By planning and adapting the strategy to align with these factors, ODW can deliver an incident response plan, enforce policy compliance, and allocate responsibilities effectively, ensuring comprehensive security.
Incident Response Plan:
Employees and Contractors:
Clients:
We clearly outline data security responsibilities in agreements and provide guidelines on secure data handling. In cases where ODW can serve as a subject matter expert, we share best practices and periodic updates to help clients maintain compliance with evolving security requirements.
The following technical security controls outline general practices we employ at ODW. While these standards apply broadly, specific implementations depend on each project's unique requirements and tech stack.
By adapting access controls, encryption, and monitoring measures to the architecture in use, we ensure optimal protection of client data across all our solutions. This flexible approach helps us maintain a high standard of security tailored to the technologies involved in each project.
Access Controls (Authentication, Role-Based Access):
Data Sharing and Transmission Procedures:
System and Network Monitoring (Intrusion Detection, Logging):
Classification and Labeling of Data:
Data Retention and Deletion Policies:
Contracts to Ensure Compliance with Security Standards:
ODW prioritizes continuous improvement in our security practices by:
Periodic Review of Policies and Procedures:
Audits and Assessments to Identify Gaps: