Skip to main content
Linkup maintains a comprehensive set of security and operational policies as part of our Information Security Management System (ISMS). These policies are regularly reviewed and updated to reflect current best practices and regulatory requirements. Policy documentation is available upon request for qualified prospects and clients.

Core security policies

PolicyDescription
Information Security PolicyDefines governance, security objectives, risk management framework, and responsibilities for protecting company and client assets.
Data Classification & Handling PolicyEstablishes classification levels (Public, Internal, Confidential, Restricted) and handling, storage, transmission, and disposal requirements.
Access Control PolicyCovers user access management, RBAC, privileged access, access review procedures, and account lifecycle management.
Incident Response & Management PolicyProcedures for detecting, reporting, responding to, and recovering from incidents; includes notification timelines and escalation.
Business Continuity & Disaster Recovery PolicyStrategies and procedures to maintain operations during disruptions and recover systems/data (defined RTOs/RPOs).
Data Retention & Deletion PolicyRetention periods by data type; secure disposal procedures, including Zero Data Retention (ZDR) capabilities.
Change Management PolicyProcesses for planning, testing, approving, and implementing changes to minimize risk and maintain stability.
Vulnerability Management PolicyIdentification, assessment, prioritization, and remediation via scanning, pen testing, and patching with SLAs by severity.
Backup & Recovery PolicyBackup frequency, retention, storage, encryption, and testing to ensure recoverability.
Vendor & Third-Party Risk Management PolicyRequirements to assess, onboard, and monitor vendors/service providers against security and compliance standards.
Acceptable Use PolicyAppropriate and prohibited use of Linkup systems, data, and resources by employees and authorized users.
Encryption & Cryptography PolicyEncryption standards for data at rest/in transit, key management procedures, and approved algorithms/protocols.

Additional policies

Additional specialized policies covering physical security, human resources security, network security, secure development, privacy management, and other areas are maintained as part of our comprehensive ISMS and are available upon request.

Accessing policy documents

To request specific policies or attestations, contact support@linkup.so.