Information Security Policy Summary
Summary of Build Better, Inc.โs core security and acceptable use practices
๐ Read and download the full Information Security Policy on our trust portal:
https://trust.buildbetter.ai/resources?s=82ed75cltv69qy292r9sgi&name=information-security-policy-(aup)
Information Security Policy Summary
Effective Date: January 1, 2023
Policy Owner: Spencer Shulem, CEO
๐ Purpose & Scope
This policy outlines acceptable use and required protections for Build Better, Inc.โs systems, networks, and data. It applies to all employees, contractors, and third parties accessing Build Better, Inc. assets.
Security is a shared responsibility, and all personnel are required to act in accordance with this policy and report incidents promptly.
๐ฆ Key Security Controls
๐ Device & Mobile Security
- All end-user devices must be:
- Locked with a password or biometric
- Set to auto-lock after 5 minutes
- Encrypted if storing or accessing confidential data
- Confidential data may not be stored on USB drives or personal devices.
- Lost or misused devices must be reported immediately.
๐ Access Controls
- Passwords must follow the Access Control Policy.
- Users may not share credentials or leave devices unattended and unlocked.
- All VPN and remote access tools must be company-approved and use MFA.
๐งน Clear Desk & Clear Screen
- Users must lock screens when not in use.
- Confidential materials must not be left visible or unsecured in the workspace.
๐ Acceptable Use & Unacceptable Activities
Build Better, Inc. systems are for authorized business use only. Prohibited activities include:
- Unauthorized software installs or access
- Network sniffing, denial of service, or unauthorized scanning
- Storing or transmitting copyrighted, offensive, or malicious material
- Sharing confidential data without permission
- Bypassing security mechanisms or using rogue software
๐ก๏ธ Incident Reporting
All suspected security incidents or policy violations must be reported immediately to:
๐ง security@buildbetter.app
Whistleblower protections are in place to encourage good-faith reporting of violations, fraud, or misconduct.
๐ Remote Access & Public Network Use
- Only authorized, encrypted remote access (e.g., VPN with MFA) is permitted.
- Public Wi-Fi use requires VPN.
- Users must not save credentials or download data on public/shared machines.
๐ Linked Security Policies
This policy incorporates and references the following:
- โ Access Control Policy
- โ Cryptography Policy
- โ Data Management Policy
- โ Secure Development Policy
- โ Incident Response Plan
- โ Risk & Asset Management
- โ Business Continuity & Disaster Recovery
- โ Operations & Physical Security
Personnel are required to understand and follow all applicable linked policies.
โ Compliance & Enforcement
- Audits and monitoring are conducted regularly.
- Violations may result in disciplinary action, including termination.
- Exceptions must be approved by the IT Manager.
๐ Read and download the full Information Security Policy on our trust portal:
https://trust.buildbetter.ai/resources?s=82ed75cltv69qy292r9sgi&name=information-security-policy-(aup)