FEHA Logo
FEHA

Coinmerce

Di perusahaan kami, kepercayaan adalah fondasi dari setiap hubungan yang kami bangun. Kami berkomitmen untuk menghadirkan transparansi, integritas, dan keamanan dalam setiap langkah—mulai dari cara kami mengelola data, memberikan layanan, hingga bagaimana kami berinteraksi dengan pelanggan dan mitra. Dengan standar etika yang tinggi, proses yang bertanggung jawab, serta kepatuhan terhadap regulasi industri, kami memastikan bahwa setiap keputusan yang kami ambil selalu berpihak pada keamanan dan kepuasan Anda. Halaman ini dirancang untuk memberikan gambaran jelas mengenai komitmen kami dalam menjaga kepercayaan yang Anda berikan.

Contact us
risk@coinmerce.io
Cloud Computing
Saudi Arabia Personal Data Protection Law (PDPL) Framework

Completed Compliance

Frameworks that have been fully implemented

Saudi Arabia Personal Data Protection Law (PDPL)

Saudi Arabia Personal Data Protection Law (PDPL)

5 controls fully implemented

100% Complete

Resources

Access Control Policy

This Access Control Policy for Coinmerce, a Cloud Computing company operating a Crypto Platform, outlines the procedures and controls for managing access to its information systems and data. It covers key aspects such as user identification, authentication mechanisms (including MFA and strong passwords), authorization based on the principle of least privilege, regular access reviews, automated session logoffs, and secure management of third-party and privileged access. The policy also details password management standards, segregation of duties, and a framework for monitoring compliance and enforcing policy provisions, including a process for exceptions. The policy is designed to align with ISO 27001:2022 principles to ensure robust information security.

GENERATED
Private

In Progress Compliance

This score is determined through an assessment performed by our FEHAGRC Consultant tes.

ISO27001:2022COMPLIANCEMONITOREDBY FEHA

ISO 27001:2022

7 of 123 controls implemented

16 Controls

AI Security / Application Security

Mobile Device Management (MDM)
Penetration Testing Report
Source Code Access Control Policy or Procedure
34 Controls

Data Protection and Privacy

Privacy Policy
Data Retention and Disposal policies
Data Transfer Policy
27 Controls

Procedures and Policy

Mobile Device Management Policy
Incident Response Plan
Acceptable Use Policy
14 Controls

Internal Organization Security

Service Level Agreement Template
Information Security Management System (ISMS) Plan
Internal Audit Report
37 Controls

Infrastructure Security

Physical Security Policy
Network Security Policy
Network Diagram
22 Controls

Organizational Security

Security Awareness Training Programme
Information Security Policy
List of contact authorities