Decision Science Research Corporation Trust Center
Efficient dispute resolution is predicated on the secure handling of party data. Decision Science Research Corporation maintains a security-first architecture to protect the data of our users. This commitment is reflected in our rigorous development standards, infrastructure management, and corporate governance policies. We prioritize the protection of all information assets to ensure the continued reliability and integrity of our resolution platform.
Compliance
Resources
Business Continuity and Disaster Recovery
Data Classification Policy
Network Security Policy
Information Technology Leadership Committee Charter
Company Handbook
Controls
Source code access restricted and changes logged
Access control procedures
Multi-factor authentication enforced for production access
Quarterly user access reviews performed
Termination Access Revocation Checklist
Data encrypted at rest
Customer data deleted after termination
Backup and recovery policy
Outsourced development security requirements managed
Source code changes tested and approved
Secure connection means utilized
Web application firewalls configuration
External Attack Surface Vulnerability Scanning & Remediation
Anti-malware monitoring
Intrusion detection tool
Infrastructure firewall
Monitoring tool
Centralized Log Collection and Monitoring
Business continuity & disaster recovery plans documented and tested
Security incident logging and review
Breach notification communication
Visitor sign-in, badging, and escort policy
Technology assets inventoried
Documented Vendor Management Program
Vendor list
Vendor termination
Vendor onboarding
Confidentiality Agreement acknowledged by employees
Employee handbook
List of active employees & contractors as on date
List of newly hired employees & contractors
Security awareness training implemented
Whisteblower mechanism maintained
Multi-availability zones
Documentation available to internal and external users
Customer support channels available
Asset register maintaining
Risk and Governance Executive Committee meeting minutes
Risk management program
Information security policies and procedures
Patch management process developed
Production system hardening and baseline configuration management
Reported security concerns addressed and resolved
Organization chart
Subprocessors
Loops - The email platform built for SaaSCustom
GitHubCode & Build Security
PostHogBusiness Apps & Productivity
NeonData Stores & Warehouses