Privacy Statement
Version: 3.0
Last Updated: January 2023
1. Caseware’s Commitment to Privacy
Caseware International Inc., together with its affiliates and subsidiaries (collectively “Caseware”, “we”, “us” or “our”) has developed this Privacy Statement (this “Statement”) to describe Caseware’s policies and practices with respect to Personal Data we receive from (i) current and potential customers, (ii) visitors to our cloud platforms, www.caseware.com, caseware.com/uk and related Caseware webpages (collectively the “Website”), (iii) employment candidates and/or (iv) other individuals (collectively “you”, or “your”). For the purposes of this Statement, “Personal Data” refers to any information relating to an identified or identifiable natural person, and shall also mean all “Personal Information” as defined in the California Privacy Rights Act (“CRPA“).
We will review this Statement on a regular basis to ensure it (i) aligns with our privacy practices and (ii) remains compliant with applicable law. In the event we update and/or amend this Statement in a material way, we will publish a notice on the Website.
If you have any questions about this Statement or Caseware’s privacy practices, please contact us at:
Global Privacy Office
Caseware International Inc.
351 King Street East, Suite 1100
Toronto Ontario M5A 2W4 Canada
Data Protection Officer/Chief Privacy Officer
Angela D. LeBreton
2. Personal Data We Collect & Purposes for Collection
From time to time, we will collect from you Personal Data when you (i) use our products, services or request technical support from us, (ii) register or attend an event that Caseware is hosting or participating in, (iii) access or download content from our Website (such as whitepapers), (iv) use our Website to apply for a job at Caseware, and (v) otherwise communicate with us via email, in person or through our Website.
The types of Personal Data collected may include the following:
- last name, first name – the purpose of which is to identify you;
- contact information such as telephone number address, or email address – the purpose of which is to communicate with you;
- education and professional history, professional certifications, contacts for background checks, and other relevant information – the purpose of which is to support your job application for consideration of employment at Caseware; and/or
- IT usage data (e.g., cookies, user ID, passwords, roles, geolocation data) as applicable – the purpose of which is to provide you access to our products and services, including access to our Website, MyCaseware and other technical support portals made available by Caseware.
Our products and services are intended for business use, and we do not expect them to be of any interest to minors. We do not intentionally collect any personal information of consumers below the age of 16. By providing your Personal Data to us, you are indicating you agree and consent that we may collect, use, disclose and process your Personal Data in accordance with this Statement. If you do not agree with the terms set out in this Statement, we request that you do not provide any Personal Data to us. Please note that certain services, such as a request for information about our products or access to our Website, may only be able to be provided to you if you provide us with your Personal Data. In addition, Caseware may use anonymized information regarding usage of Caseware products and services for the purpose of making additions, adjustments, or modifications to our products and services.
3. Cookies
When you visit our Website, we may use “cookies”, web beacons, tags, JavaScript and similar technologies to automatically collect Personal Data from your computing or mobile devices as you navigate our Website. This Personal Data may include IP address, device and application identification numbers, geolocation, browser type, Internet service provider and/or mobile carrier, the pages and files viewed, searches, operating system and system configuration information and date/time stamps associated with your usage.
Cookies are small files that could be saved on your computer to track, save and store information about you when you use our Website. Sometimes we use third party cookies (such as Google Analytics and HubSpot). We use this information to (i) support the functioning of our Website, (ii) understand usage of the Website, (iii) determine browsing preferences to improve site behaviour, (iv) improve your website experience by providing you with a tailored experience within the Website, including custom marketing advertisements, (v) provide secure log-in, and/or (vi) to show you geographically relevant content.
The types of cookies used on the Websites include the following:
- Strictly Necessary Cookies: These cookies are essential in supporting the functionality and operation of the Website. Strictly necessary cookies on our site include cookies that allow you to access the secure area of our website. If users block or disable these cookies, parts of the website may not work or become inaccessible.
- Performance Cookies: These cookies gather statistical data to measure the performance of the Website and to provide a better user experience. Examples of performance cookies include tracking which pages are most visited and monitoring page load speeds. Performance cookies collect data anonymously, meaning they do not collect identifiable information on visitors. While performance cookies are typically first party session and persistent cookies, sometimes we also use cookies to enable us to monitor Website usage and traffic, conduct market research and improve site functionality.
- Functional Cookies: These cookies enable the Website to remember your preferences and provide enhanced user functionality and personalization. Examples of functional cookies include remembering your settings such as region and language preferences or allowing you to watch videos on Website. Functional cookies include first party and third party persistent or session cookies.
- Advertising & Targeting Cookies: These cookies (including tracking tags) track user activity on Website and are designed to gather information from you to provide targeted adverts based on relevant topics and interests on other sites on other websites. Examples of advertising and targeting cookies include social media cookies that display ads to users on social media platforms. Advertising and targeting cookies are typically authorized third party persistent cookies. These cookies do not collect personal information, rather, they gather data based on uniquely identifying your browser and internet device to build user profiles from site visitors.
When you access the Website, a pop-up cookie banner will appear. You may select to opt-out of our use of cookies when you visit the Website by changing the cookie settings through your browser.
Additionally, web beacons may be used in email communications to you. Web beacons record visits to a particular web page or viewing of a particular email. For example, Caseware may place web beacons in marketing emails that notify us when a link in an email directs the visitor to the Website. Such technologies are used to operate and improve the Website and email communications.
4. How We Share Personal Data
We do not sell the personal information of consumers. We share Personal Data with our service providers for the purposes set out in this Statement, including but not limited to assisting us to provide you Caseware products and services or consider you for employment at Caseware. For example, Caseware uses (i) ‘Amazon Web Services’ to securely store Personal Data belonging to our customers and (ii) ‘Lever’ to help us coordinate your employment application with us. Our service providers are obligated, through contractual clauses, to use the Personal Data we transfer to them exclusively for the purpose of providing their services and to protect it at the same high level we do.
Exceptionally, we may be required to disclose Personal Data to comply with applicable laws, regulations, court orders, subpoenas or other legal process or investigation, with or without your consent. In any case, we ensure the disclosure is allowed or required by law and we will not disclose more information than is required.
5. Where Personal Data is Stored
Caseware is a Canadian company, however, we have customers (both actual and potential), employees, service providers, resellers/distributors, partners, and job candidates across the world. In order to operate our business on a global scale, we may be required to process and transfer Personal Data outside of your state, province, or country, including to the United States of America. Further, through our service providers, Personal Data may also be stored on servers located throughout the world.
With respect to customer data in our products and services, which may include Personal Data, at the time of subscribing to such products and services, customers will be advised as to the geographic server that will host Personal Data and will be given an opportunity to consent thereto prior to Personal Data of Customer being stored with any such data hosting provider.
Where Personal Data is transferred or stored across borders, we take steps to protect and safeguard it, including ensuring it is transferred in accordance with applicable law. For example, if you are in Europe, the UK, or Switzerland, Caseware’s Data Processing Agreement will apply to you. Also, when we send your Personal Data to Canada it is protected under Canadian law, which the European Commission has deemed to provide an adequate level of protection for any Personal Data transferred. If your Personal Data is then transferred to our service providers outside of Canada, this information is transferred and protected by contractual terms and conditions that are comparable to those provided in the European Commission’s Standard Contractual Clauses (SCCs).
6. How We Protect Personal Data
Caseware protects the security and confidentiality of Personal Data transferred to us using reasonable and industry standard security measures against unauthorized access, modification, and disclosure according to its level of sensitivity. For example, we generally store Personal Data on secure servers that are encrypted and limited on the basis of ‘need to know’, where applicable. Unfortunately, the risk of cyberattacks and data breaches always remains. If Caseware discovers or is advised of an incident where Personal Data is lost, stolen, accessed, used, disclosed, copied, modified or disposed of by unauthorized persons or in an unauthorized manner, we will advise you as soon as we can and comply with all applicable legal requirements.
To increase the level of security of Personal Data on our systems, you are encouraged not to share your password or other forms of authentication to the Website, products or services with another person. If you become aware of any misuse of your login credential, immediately change your password and notify us through the customer portal on the Website or by emailing us at privacy@caseware.com.
7. How Long We Retain Personal Data
Caseware retains Personal Data for only as long as necessary to fulfill the purposes for which it is provided. For example, if you provide us with your Personal Data for us to consider you for employment with Caseware and you are hired, the Personal Data becomes part of your personnel file. If you are not hired, we retain the Personal Data for one (1) year after completion of the recruitment process unless you ask us to delete it earlier.
Exceptionally, we may be required to retain Personal Data for longer to comply with our legal obligations, resolve disputes, and enforce agreements with Caseware.
8. Your Individual Privacy Rights
You may access and/or update your Personal Data with Caseware (including but not limited to requesting us to return, remove, or make corrections to it) or exercise any other right available to you as a ‘data subject’ under applicable privacy laws by contacting us at privacy@caseware.com.
To protect your Personal Data, we may need to verify your identity before assisting with your request, such as verifying that the information used to contact us matches the information that we have on file, provided we are not prohibited to do so by law, for example if doing so would disclose Personal Data about another individual.
If you use an authorized agent to exercise a right on your behalf, for example, where a job applicant uses an agent to request access to information relating to their application, you must provide the authorized agent written permission to do so. We may deny the request if the authorized agent does not submit sufficient proof that they have been authorized by you to act on your behalf.
If we are able to verify your identity, we will provide you a response to your request within 30 days. If we need an extension to fulfill your request, we will also let you know.
If you are not satisfied with our response either to your request to exercise your individual rights or to your complaint about the protection of Personal Data at Caseware, you have the right to lodge a complaint with the data protection or privacy authority where you reside.
California Privacy Rights
As a California resident, you may be able to exercise the following rights in relation to the Personal Information about you that we have collected (subject to certain limitations at law):
- The right to know any or all of the following information relating to your Personal Information that we have collected and disclosed in the last 12 months (upon verification of your identity):
- The specific pieces of Personal Information we have collected about you;
- The categories of Personal Information we have collected about you;
- The categories of sources of the Personal Information;
- The categories of Personal Information that we have disclosed to third parties for a business purpose, and the categories of recipients to whom this information was disclosed;
- The categories of Personal Information we have sold and the categories of third parties to whom the information was sold; and
- The business or commercial purposes for collecting or selling the Personal Information.
- The right to request deletion of Personal Information we have collected from you, subject to certain exceptions.
- The right to opt-out of Personal Information sales to third parties now or in the future. However, we do not sell your Personal Information.
- You also have the right to be free of discrimination for exercising these rights.
Please note that if exercising these rights limits our ability to process Personal Information (such as a deletion request), we may no longer be able to provide you with our products and services or engage with you in the same manner.
9. How to Exercise Your Rights
To exercise your right to know and/or your right to deletion, please submit a request by contacting us at privacy@caseware.com.
We will need to verify your identity before processing your request. In order to verify your identity, we will generally require sufficient information from you so that we can match it to the information we maintain about you in our systems. Sometimes we may need additional personal information from you to be able to identify you.
We may decline a request to exercise the right to know and/or right to deletion, particularly where we cannot verify your identity or locate your information in our systems or as permitted by law.
You may choose to designate an authorized agent to make a request under the CCPA on your behalf. No information will be disclosed until the authorized agent’s authority has been reviewed and verified. Once an authorized agent has submitted a request, we may require additional information (i.e., written authorization from you) to confirm the authorized agent’s authority.
If you are an employee/former employee of a Caseware client that uses our application and services, please direct your requests and/or questions directly to your employer/former employer.
If you are a third party (auditor, business associate, etc.), who was given access to the Caseware product or service by a Caseware client, please direct your requests and/or questions directly to the Caseware client that gave you access.
Application and Interface Security
Our Software Development Life Cycle (SDLC) ensures that our applications and programming interfaces (APIs) are designed, deployed, and tested in accordance with leading industry standards – such as OWASP, ISO, and SOC – and adhere to legal, statutory, or regulatory compliance obligations.
You will be onboarded once all agreements and policies are accepted for usage of the service. You are responsible for ensuring your usage of Caseware Cloud is in compliance with applicable laws and regulations.
Legal specifics can be found in the Cloud Services Agreement here.
Our policies and procedures have been established and are maintained in support of data security to include confidentiality, integrity, and availability across multiple system interfaces, jurisdictions, and business functions to prevent improper disclosure, alteration, or destruction.
Audit Assurance and Compliance
Independent audits are conducted by registered 3rd parties as part of our compliance program for ISO 27001 and SOC 2 for our Cloud services. We also have an internal audit program, external penetration testing and regularly scheduled internal vulnerability testing. Vulnerability test results are shared with customers as outlined in the Client Initiated Testing Policy. The results of these processes are tracked through our improvements process. The methodology and tools used to conduct penetration testing is tailored to each assessment for specific targets and attacker profiles. SOC 2 reports are provided under NDA to clients. Our SOC 3 Report is available in PDF format here.
Production data is stored on Amazon Web Services (AWS). The application handles logical separation of client data through database isolation. Data that is transferred to and from our service (including backups) is 100% encrypted over an SSL connection (AES-256-bit – the same strength used in online banking). Data transmission occurs between client and server, and databases. Controls are in place for secure and encrypted bulk data transfers. There are no email transmissions. For more information on security, see: https://www.casewarecloud.com/security.html. Our legal team monitors our regulatory obligations. Please refer to our Cloud Services agreement for legal requirements here.
Business Continuity Management and Operational Resilience
Caseware has a consistent unified framework for business continuity planning and has established, documented, and adopted this to ensure all business continuity plans are consistent in addressing priorities for testing, maintenance, and information security requirements.
Requirements for business continuity plans include the following:
- Defined purpose and scope, aligned with relevant dependencies
- Accessible to and understood by those who will use them
- Owned by a named person(s) who is responsible for their review, update, and approval
- Defined lines of communication, roles, and responsibilities
- Detailed recovery procedures, manual work-around, and reference information
- Method for plan invocation
Our business continuity and security incident response plans are tested at planned intervals or upon significant organizational or environmental changes. Incident response plans involve impacted customers (tenant) and other business relationships that represent critical intra-supply chain business process dependencies.
Our service is hosted on Amazon’s AWS and utilities services and environmental conditions (for example, water, power, temperature and humidity controls, telecommunications, and internet connectivity) are secured, monitored, maintained, and tested for continual effectiveness at planned intervals to ensure protection from unauthorized interception or damage, and are designed with automated failover or other redundancies in the event of planned or unplanned disruptions.
Our cloud service is completely virtual and hosted on Amazon Web Services (AWS). Amazon is also ISO and SOC2 compliant and responsible for restricting access to facilities housing the productions systems to authorized individuals. AWS is also responsible for environmental protection and preventative maintenance over production systems. AWS has published further details here: https://aws.amazon.com/compliance/data-center/controls. These certifications address physical security, system availability, network and IP backbone access, customer provisioning and problem management. Physical access and environmental controls are managed and controlled by AWS. AWS physical protection assurance information can be found at: https://aws.amazon.com/compliance.
Caseware has aligned our security program to ISO 27001 and we have business continuity processes in place to address disruptions to critical services. We monitor all cloud instances for performance and availability and incorporate the following:
- Identify critical products and services
- Identify all dependencies, including processes, applications, business partners, and third party service providers
- Understand threats to critical products and services
- Determine impacts resulting from planned or unplanned disruptions and how these vary over time
- Establish the maximum tolerable period for disruption
- Establish priorities for recovery
- Establish recovery time objectives for resumption of critical products and services within their maximum tolerable period of disruption
- Estimate the resources required for resumption
Customers can see our real-time operational status at our status page here: https://caseware.statuspage.io/.
We maintain a central system for documentation and train all staff on processes. Procedures include change management, security processes, roles and responsibilities of internal users. Our procedures are updated on an as needed basis and revision histories are logged. Additionally, policies and procedures shall include defined roles and responsibilities supported by regular workforce training.
Caseware maintains a records and retention policy for Cloud services. The retention policy is not client-specific. Backup and recovery procedures are documented and automated alerts are sent daily to operations staff. Backup and recovery measures have been incorporated into business continuity planning and tested accordingly for effectiveness. See the retention policy for each category of records below.
System transaction logs
Description: Database journals and other logs used for database recovery.
Retention period: 30 days.
Reason for retention: Based on backup and recovery strategy.
Allowable storage media: Electronic.
Audit logs
Description: Security logs, for example, records of logon/logoff and permission changes.
Retention period: 30 days.
Reason for retention: Maximum period of delay before forensic investigation.
Allowable storage media: Electronic.
Operational procedures
Description: Records associated with the completion of operational procedures.
Retention period: 2 years.
Reason for retention: Maximum period elapsed regarding dispute.
Allowable storage media: Electronic.
Customer
Description: Customer backups.
Retention period: 90 days.
Reason for retention: Data protection requirement.
Allowable storage media: Electronic.
Change Control and Configuration Management
Change management controls have been established for any new development and/or acquisition of new data, physical or virtual applications, infrastructure network and systems components, or any corporate, operations and/or data center facilities have been pre-authorized by the organization’s business leadership or other accountable business role or function. Our SDLC has a defined quality change control and testing process with established baselines, testing, and release standards which focus on system availability, confidentiality and integrity of systems and services.
Policies and procedures have been established, and supporting business processes and technical measures implemented, to restrict the installation of unauthorized software on organizationally-owned or managed user end-point devices and IT infrastructure network and systems components within the production cloud environment. Our change management policies and procedures include managing the risks associated with applying changes to business-critical or customer impacting applications and system-system interface (API) designs and configurations. Technical measures have also been implemented to provide assurance that all changes directly correspond to a registered change request, business-critical or customer, and/or authorization by, the customer as per agreement prior to deployment.
Data Security and Information Lifecycle Management
Caseware has policies and procedures and supporting business processes and technical measures in place to inventory and maintain data flows within the SaaS network and systems for each geographic location. Controls are in place to ensure that data is placed in the geographic area determined by the client. Subscriber data within the production cloud environment resides on two-tier architecture and is not directly accessible from the internet.
Our security policy defines four levels of data classification: confidential, restricted, operational, and public. All data stored within the production cloud infrastructure is considered confidential, which is our highest level of security and only authorized staff have access to this environment. Logical access to the production cloud environment is restricted to the operations team alone.
All subscriber data is stored in the production cloud environment. Use of customer data in non-production environments is controlled through secure data-handling processes, which require explicitly documented approval from the customers whose data is affected, and must comply with legal and regulatory requirements for scrubbing of sensitive data elements.
There is a designated operations team responsible for all operational functions regarding the infrastructure and storage with assigned responsibilities that have been defined, documented, and communicated.
Caseware Cloud is hosted on Amazon web servers around the world. Upon subscribing to the Caseware Cloud Services, CWC informs clients of the jurisdiction in which the server that has been allocated to host your Subscriber Data and Personal Information is located. You may consent to such allocation, or refuse a server so allocated.
For performance reasons, we’ll typically set you up in:
- United States/North Virginia if you’re located in the United States or South America
- Canada/Montreal if you’re located in Canada
- Australia/New South Wales if you’re located in the Asia-Pacific region
- Ireland/Leinster if you’re located in any other region
Data center Security
The production infrastructure is completely hosted within Amazon’s AWS. AWS is responsible for restricting access to facilities housing the production systems to authorized individuals. AWS is also responsible for environmental protection and preventative maintenance over production systems. Physical access is controlled by AWS at the perimeter and at building ingress points. Full details can be found here: https://aws.amazon.com/whitepapers/#security. AWS has published further details here: https://aws.amazon.com/compliance/data-center/controls/.
Our production infrastructure is completely hosted within Amazon’s AWS. AWS has SOC 2 reports, which are reviewed annually. AWS governance processes can be found here: https://aws.amazon.com/compliance/.
Encryption and Key Management
Our cryptography policies and procedures are designed to support business process. Technical measures have been implemented based on business requirements for protection of data at rest and data in transit as per applicable legal, statutory, and regulatory compliance obligations.
Our cryptography policy requires all encryption keys to have identifiable owners within the organization. The cryptographic key lifecycle management ensures access controls are in place for secure key generation, exchange and storage, including segregation of keys used for encrypted data or sessions.
Data stored at the server level (data-at-rest) is encrypted using the industry standard AES-256 algorithm. Data that is transferred to and from our service (data-in-transit) is encrypted via TLS with ephemeral key exchange and use industry-accepted strong cipher suites. Certificates use a minimum of 2048-bit key strength with SHA-2 or stronger signature algorithm. Private keys are generated and stored in our secrets management systems. They are deployed and used on production systems as needed via our change control process. Certificates are obtained through a reputable vendor and follow the built-in and industry standard renewal/rotation process based on expiry or revocation as needed.
Governance and Risk Management
Security risk assessments are completed at least annually and consider the following:
- Awareness of where sensitive data is stored and transmitted across applications, databases, servers, and network infrastructure
- Compliance with defined retention periods
- Data classification and protection from unauthorized use, access, loss, destruction, and falsification
We have implemented an Information Security Management System based on ISO 27001 and SOC 2 controls. Our ISMS includes the following areas insofar as they relate to the characteristics of the business:
- Information Security Policy (this document)
- Access Control Policy
- Availability Management
- Clean Desk Policy
- Cryptography Policy
- IS Supplier Management Policy
- Logging and Monitoring Policy
- Mobile Device Policy
- Network Security Policy
- Password Management Policy
- Patch Management Policy
- Software Policy
- Technical Vulnerability Management Policy
- Risk Assessment Methodology
- Malware, Email and ISMS Policy
- Internet Acceptable Use Policy
- Penetration Testing Policy
- Teleworking Policy
- Records Retention and Protection
Department managers are responsible for maintaining awareness of, and complying with, security policies, procedures, and standards that are relevant to their area of responsibility.
Risk acceptance levels have been defined within the risk management methodology and all risks are mitigated to an acceptable level with reasonable resolution time frames and stakeholder approval.
Our information security policies and procedures are posted and available for review by all impacted staff and external business relationships. The Information Security Steering Committee is responsible for developing, maintaining, and enforcing our service’s information security policies. The information security policy is reviewed annually and approved by the Information Security Steering Committee. Executive and line management provide support for information security through clearly documented direction and commitment, and shall ensure action has been assigned. There is a senior member of management who is responsible for information security governance and operations, including protection of customer data – this role reports to the CFO.
Policy reviews are conducted annually by the Information Security Steering Committee or as a result of changes to the organization to ensure its continuing alignment with the security strategy, effectiveness, accuracy, relevance, and applicability to legal, statutory, or regulatory compliance obligations.
Formal risk assessments are performed annually and in conjunction with any changes to information systems to determine the likelihood and impact of all identified risks. The likelihood and impact associated with inherent and residual risk is determined independently, considering all risk categories based on audit results, threat and vulnerability analysis, and regulatory compliance. Risk assessment results can include updates to security policies, procedures, standards, and controls to ensure that they remain relevant and effective. The results of risk assessments are:
- Reported to senior management who then partake in a risk treatment process
- Updated in a risk register
- Prioritized based on possible impact to production systems
Our HR has a defined screening process for all staff. Reference checks are obtained with respect to all employees at time of hiring, with criminal and credit background checks for those who perform operational roles with the product cloud environment. All staff are required to sign a confidentiality agreement prior to employment to ensure protection of client information for the protection of data. Information security awareness training is provided during employee onboarding. Specific training is provided for developers on secure coding practices. Formal records are maintained for completion of internal staff training. Employee terminations and position changes are initiated by department managers. Our HR team reviews these requests and submits the request through our ticketing system for de-provisioning and provisioning requirements. Our HR team has an employee departure process to ensure all equipment is returned and accounts terminated to ensure that access to production environments is removed.
A security awareness training program has been established for all contractors, third-party users, and employees and is mandated. All individuals with access to confidential and restricted data receive appropriate awareness training and regular updates in organizational procedures, processes, and policies relating to their job function relative to the organization. Roles and responsibilities of contractors, employees, and third-party users are documented as they relate to information assets and security.
User responsibilities are defined within job descriptions for all staff and they are made aware of their roles and responsibilities for:
- Maintaining awareness and compliance with established policies and procedures and applicable legal, statutory, or regulatory compliance obligations
- Maintaining a safe and secure working environment
- Report any suspicious activity if detected
We have a clear screen policy which requires that unattended workspaces do not have openly visible sensitive documents and user computing sessions had been disabled after an established period of inactivity.
We have an Access Control policy in place that specifies how to manage access control to all system components and sensitive information in the organization. Policies governing acceptable use or access to subscriber data and metadata is included in the Caseware privacy policy (https://www.caseware.com/privacy-statement/). Caseware collects, uses and discloses information only for the following purposes:
- To verify your identity
- To provide you with the Caseware Cloud Services
- To contact you for the purposes of product information, service updates, billing notifications, or notifications relating to the Caseware Cloud Services
- To monitor and/or improve system usage, server and software performance
- To assist with technical support issues
- To comply with any laws, regulations, court orders, subpoenas or other legal process of investigation and to protect CWC, its Affiliates and other individuals from harm
- To improve and enhance CWC Service offerings
Identity and Access Management
Policies and procedures have been established to store and manage identity information about every person who accesses the production cloud infrastructure and to determine their level of access. Access control policies and procedures have been established, and supporting business processes and technical measures implemented, for restricting user access as per defined segregation of duties to address business risks associated with a user-role conflict of interest. The access control repository is managed by the provider. We use a privileged identity manager and password management system.
Access to, and use of, audit tools that interact with production cloud environment is segmented and restricted to prevent compromise and misuse of log data. User access to diagnostic and configuration ports are restricted to authorized individuals and applications.
Controls are in place to ensure only approved software is installed within the production cloud infrastructure.
Access to the organization’s own developed applications, program, or object source code, or any other form of intellectual property (IP), and use of proprietary software is controlled following the rule of least privilege based on job function as per established user access policies and procedures.
Caseware Cloud Service requires password authentication to access the base system. Once in the system, users must be assigned security roles to perform additional operations and access certain content. With security roles, you can control who has access to what content. Your organization is responsible for developing appropriate security policies around passwords and security roles using the security features provided in Caseware Cloud. Caseware provides access to clients, who then control their own users and administrative accounts, including provisioning and de-provisioning. Two-factor authentication is employed. User access is authorized and revalidated quarterly, to ensure the rule of least privilege based on job function. For identified access violations, remediation activities are followed based on the established user access policies and procedures. Timely de-provisioning (revocation or modification) of user access to data or managed applications, infrastructure systems, and network components, has been implemented as per established policies and procedures and based on user’s change in status such as termination of employment or other business relationship, job change, or transfer. The provider manages service account provisioning and de-provisioning. Service account authentication utilizes multi-factor authentication.
Infrastructure and Virtualization Security
Caseware Cloud deploys a SaaS-based endpoint detection and response security endpoint to all hosts within our infrastructure. All user, process, and network activity is collected and stored in the tamper-proof central location and analyzed in near real-time for suspicious behaviors as well as for manual forensics. Protection, retention, and lifecycle management of audit logs, adhere to applicable legal, statutory, or regulatory compliance obligations and provide unique user access accountability to detect potentially suspicious network behaviors and/or file integrity anomalies, that are required to support forensic investigative capabilities in the event of a security breach. Our tools have the capability to detect/prevent unauthorized or anomalous behavior based on network traffic or host activity. All authentication events, successful and failed, are logged.
Our production and non-production environments are separated to prevent unauthorized access or changes to information assets. Separation of the environments include logical separation and segregation of duties for personnel accessing these environments as part of their job duties.
Our production system and network environment is protected by centrally managed firewalls and ensures separation of production and non-production environments. Our production environment is designed, developed, deployed, and configured to ensure our operations team and clients user access is appropriately segmented from other client users, based on the following considerations:
- Established policies and procedures
- Isolation of business critical assets and/or sensitive user data and sessions that mandate stronger internal controls and high levels of assurance
- Compliance with legal, statutory, and regulatory compliance obligations
The production cloud infrastructure has a reliable and mutually agreed upon external time source that is used to synchronize the system clocks of all relevant information processing systems to facilitate tracing and reconstitution of activity timelines.
Supply Chain Management, Transparency, and Accountability
Policies and procedures have been implemented to ensure the consistent review of service agreements between providers and customers across the relevant supply chain. Reviews performed at least annually and identify non-conformance to established agreements. Any non-conformances are identified as actions to address service-level conflicts or inconsistencies.
Threat and Vulnerability Management
Policies and procedures have been established, and supporting business processes and technical measures implemented, to prevent the execution of malware within the production cloud environment or end user devices and IT infrastructure network and system components. Policies and procedures have been established, and supporting processes and technical measures implemented, for timely detection of vulnerabilities within organizationally-owned or managed applications, infrastructure network and system components. We also perform ongoing application and code vulnerability evaluations of our products and have dual peer reviews of all code changes to ensure the efficiency of implemented security controls. Our risk management methodology is used for prioritizing remediation of identified vulnerabilities. Changes are managed through our defined change management process for all vendor-supplied patches, configuration changes, or changes to our applications. Our anti-malware solution is centrally managed and runs on all systems. The anti-malware solution includes mechanisms for detecting or preventing phishing. Malware signature updates are deployed within 1 day of release.
