Information Security Policy

Effective date:

Tendrill, LLC ("Tendrill," "we," "us," or "our") maintains this Information Security Policy to establish the framework for protecting information assets, ensuring appropriate handling of data, and maintaining compliance with applicable regulations.

1. Purpose & Scope

This policy establishes requirements for the protection of Tendrill's information assets and customer data. It applies to:

  • All Tendrill employees, contractors, and authorized users
  • All information systems, applications, and data repositories
  • Third-party systems that process or store Tendrill data
  • All forms of information: digital, physical, and verbal

2. Data Classification

Tendrill classifies information into four categories based on sensitivity and regulatory requirements:

Public

Information intended for public disclosure. No access restrictions required. Examples: marketing materials, public website content.

Internal

Information for internal use only. Limited to authorized employees. Examples: internal procedures, non-sensitive business documents.

Confidential

Sensitive business information requiring protection. Need-to-know access only. Examples: financial data, business strategies, partner agreements.

Restricted

Highly sensitive data requiring maximum protection. Strictly controlled access with audit trails. Examples: customer PII, financial account data, authentication credentials.

3. Access Control

Access to information and systems is governed by the following principles:

  • Least Privilege: Users are granted only the minimum access necessary to perform their job functions.
  • Role-Based Access Control (RBAC): Access rights are assigned based on job roles and responsibilities.
  • Segregation of Duties: Critical functions are divided among multiple individuals to prevent fraud or error.
  • Access Reviews: User access rights are reviewed quarterly and upon role changes.

4. Authentication Requirements

Multi-Factor Authentication (MFA)

MFA is required for all access to production systems, administrative interfaces, and systems containing Confidential or Restricted data.

Password requirements include:

  • Minimum length of 12 characters
  • Combination of uppercase, lowercase, numbers, and special characters
  • Prohibition of commonly used or compromised passwords
  • Unique passwords for each system and service

5. Data Handling & Storage

All data must be handled in accordance with its classification level:

  • Storage: Confidential and Restricted data must be stored in approved, encrypted systems only.
  • Transmission: Sensitive data must be encrypted during transmission using TLS 1.2 or higher.
  • Retention: Data is retained only as long as necessary for business purposes or as required by law.
  • Disposal: Data must be securely deleted when no longer needed, using approved methods.

6. Physical Security

While Tendrill primarily operates as a cloud-native company, physical security controls are maintained where applicable:

  • Cloud infrastructure providers are required to maintain SOC 2 Type II certification
  • Workstations must have automatic screen lock enabled (5-minute timeout)
  • Full disk encryption required on all company devices
  • Secure disposal of any physical media containing sensitive information

7. Change Management

All changes to production systems follow a controlled process:

  • Changes are documented and reviewed before implementation
  • Testing is performed in non-production environments first
  • Rollback procedures are established for each change
  • Emergency changes follow expedited approval with post-implementation review

8. Business Continuity & Disaster Recovery

Tendrill maintains business continuity and disaster recovery capabilities to ensure service availability:

  • Regular backups of critical data with secure offsite storage
  • Documented recovery procedures and recovery time objectives (RTO)
  • Periodic testing of backup and recovery procedures
  • Geographic redundancy for critical systems

9. Compliance & Audit Framework

We maintain compliance with applicable laws, regulations, and industry standards:

  • Regular compliance assessments against applicable requirements
  • Internal audits of security controls and procedures
  • Documentation and tracking of audit findings and remediation
  • Management review of security metrics and incidents

10. Policy Updates

This policy is reviewed annually and updated as needed to reflect changes in our business, technology environment, or regulatory requirements. Updates will be posted on this page with a revised effective date.

11. Contact

For questions about this policy or to report information security concerns:

Tendrill, LLC

141 N Water St, Unit 20

Milwaukee, WI 53202 United States

Email: security@tendrill.com