Organizational Security
Employee Background Checks
Does your organization perform employee background checks as part of its hiring process?
Yes, Planned conducts employee background checks as a part of our hiring process. We believe in maintaining a safe, secure, and trustworthy working environment, and these checks are a crucial step in ensuring that we onboard individuals who meet our standards of integrity and professionalism.
Information security
Do all employees undergo security training?
Yes, Planned has a security awareness training program to promote the team's awareness of their obligations concerning maintaining information security, privacy, and understanding of internal policies. Such program is logged and completed by all applicable new hires.
Do the workstations of all personnel automatically lock after a period of inactivity?
Yes, all personnel workstations are configured to lock automatically after a period of inactivity.
Are the hard drives of all personnel encrypted to prevent unauthorized access to data?
Yes, the hard drives of all personnel are encrypted to prevent unauthorized access to data. Full-disk encryption is used on all Planned laptops and/or desktops.
Does your organization use the principle of least privilege when granting employee access to systems or services?
Yes, Planned uses the principle of least privilege in granting access to systems and services, ensuring employees have only the necessary access for their roles, thus enhancing security.
Does your organization evaluate the credibility of job applicants to ensure that they are a good fit for a role?
Yes, Planned evaluates the credibility of job applicants to ensure they are a good fit for a role. This process involves assessing qualifications, experience, and compatibility with the organization's values and culture, contributing to a competent and cohesive workforce.
Physical access control
Is access to your organization's premises limited using physical access controls?
Yes, access to Planned's premises is limited using physical access controls. This includes measures like key card access, security personnel, and surveillance systems, ensuring only authorized personnel can enter, enhancing security and safety.