At Zenith Workflows, security isn't just a feature - it's fundamental to how we operate. This Security Policy outlines the measures we take to protect your systems, data, and credentials when you engage us for workflow investigation and diagnostics services.
Our Security Commitment
As your automation diagnostics partner, we commit to:
Treating your systems with care: We approach your business systems with the same caution and precision we would use for our own critical infrastructure.
Following security best practices: We implement current industry standards for secure access and data handling.
Maintaining confidentiality: We recognize that your automation workflows may contain proprietary business logic and sensitive data.
Documenting access: We keep detailed records of all system access for transparency and accountability.
Minimizing exposure: We access only the systems and data necessary to complete the agreed-upon work.
System Access Security
When investigating your automation systems, we follow these protocols:
Credential Management
We use an enterprise-grade password manager with strong encryption to store access credentials
We generate and use unique, complex passwords for each system
We never store your passwords in plain text documents, emails, or unsecured applications
We transfer credentials through secure channels only
Authentication Practices
We use multi-factor authentication (MFA) wherever available
We never share login sessions between devices
We maintain separate browser profiles for client work to prevent cookie contamination
We validate our identity through approved channels when accessing your systems
Access Limitation
We request the minimum access level needed to complete the work
We prefer temporary access credentials when possible
We document all access privileges granted during our engagement
We follow a formal offboarding process to ensure all access is revoked when work is complete
Data Handling Procedures
Data Access
We access your data only for the specific purpose of investigating and documenting your workflows
We never download or store your business data unless explicitly authorized and necessary
When temporary data extraction is needed, we follow documented procedures with your approval
Data Storage
Any client files are stored in secure, encrypted cloud storage with strict access controls
Local workstations are encrypted and password-protected
We maintain current antivirus and anti-malware protection on all devices
Data Transmission
We use secure, encrypted channels for all data transmission
We share project deliverables through encrypted means or secure client portals
We never send sensitive information through unsecured email attachments
Operational Security
Work Environment
We work in secure, private environments when accessing client systems
Our physical workspace has appropriate controls to prevent unauthorized viewing
We use privacy screens when working in public spaces (though this is avoided for sensitive work)
Device Security
All devices used for client work employ:
Full-disk encryption
Automatic screen locking
Regular security updates
Limited application installation
Endpoint protection software
Network Security
We use only secure, private networks for client work
All sensitive operations utilize VPN technology when appropriate
We avoid public WiFi networks for accessing client systems
Incident Response
In the unlikely event of a security incident:
We will promptly notify you of any suspected or confirmed security breaches affecting your data
We will document the incident, including what happened and what data may have been affected
We will cooperate with your security team and provide all necessary information
We will take immediate steps to contain and remediate the incident
Compliance and Standards
Our security practices align with industry standards including:
GDPR requirements for data handlers
NIST Cybersecurity Framework guidance
ISO 27001 security principles
Ongoing Security Improvement
Security is not a static achievement but an ongoing process. We continuously improve our security practices by:
Staying current with security trends and threats in the automation space
Regularly reviewing and updating our security procedures
Investing in security training and awareness
Security Verification
Upon request, we can provide:
Documentation of our security practices
References regarding our security handling
Completion of your security assessment questionnaires
Client Responsibilities
To maintain effective security during our engagement, we request that clients:
Provide access through secure channels
Create temporary credentials where possible
Inform us of any specific security protocols we should follow
Promptly deactivate access when it's no longer needed
Report any security concerns immediately
Contact for Security Matters
For security-related questions or to report concerns:
Phone: [Emergency contact number provided to active clients]
Our Commitment to Trust
Security is not just about technology - it's about trust. We understand that by investigating your automation systems, you're placing significant trust in us. We take that responsibility seriously and are committed to maintaining the highest security standards throughout our work together.
While we follow industry best practices for security, we also recognize that each client may have unique security requirements. We're always open to discussing specific security measures or adapting our processes to meet your organization's needs.